Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

CCNA CyberOps Chapter 5 Exam Online

Last Updated on May 20, 2021 by Admin

CCNA CyberOps Chapter 5 Exam Online

CCNA CyberOps 1.1 -- Chapter 5 Exam

Time limit: 0

Quiz-summary

0 of 28 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28

Information

CCNA CyberOps 1.1 — Chapter 5 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 28 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  1. Answered
  2. Review
  1. Question 1 of 28
    1. Question
    2 points

    A Cisco router is running IOS 15. What are the two routing table entry types that will be added when a network administrator brings an interface up and assigns an IP address to the interface? (Choose two.)

    Correct

    Incorrect

    A local route interface routing table entry is found when a router runs IOS 15 or higher or if IPv6 routing is enabled. Whenever an interface is addressed and enabled (made active), a directly connected interface is automatically shown in the routing table.

    Hint

    A local route interface routing table entry is found when a router runs IOS 15 or higher or if IPv6 routing is enabled. Whenever an interface is addressed and enabled (made active), a directly connected interface is automatically shown in the routing table.

  2. Question 2 of 28
    2. Question
    2 points

    What are two types of addresses found on network end devices? (Choose two.)

    Correct

    Incorrect

    Intermediary devices use two types of addresses when sending messages to the final destination device, MAC and IP addresses. TCP and UDP are protocols used at Layer 4 to identify what port numbers are being used on the source and destination devices. A return address is used when mailing a letter, not in networking.

    Hint

    Intermediary devices use two types of addresses when sending messages to the final destination device, MAC and IP addresses. TCP and UDP are protocols used at Layer 4 to identify what port numbers are being used on the source and destination devices. A return address is used when mailing a letter, not in networking.

  3. Question 3 of 28
    3. Question
    1 points

    What information within a data packet does a router use to make forwarding decisions?

    Correct

    Incorrect

  4. Question 4 of 28
    4. Question
    1 points

    Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments?

    Correct

    Incorrect

    When a router forwards traffic between LAN segments it encapsulates the Layer 2 frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.

    Hint

    When a router forwards traffic between LAN segments it encapsulates the Layer 2 frame to determine the Layer 3 path. Once the Layer 3 path is determined, the router encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2 addressing infomation for the destination LAN segment.

  5. Question 5 of 28
    5. Question
    1 points

    Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured?

    Correct

    Incorrect

    The SSID is used to name a wireless network. This parameter is required in order for a wireless client to attach to a wireless AP.

    Hint

    The SSID is used to name a wireless network. This parameter is required in order for a wireless client to attach to a wireless AP.

  6. Question 6 of 28
    6. Question
    1 points

    For which discovery mode will an AP generate the most traffic on a WLAN?

    Correct

    Incorrect

    The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.

    Hint

    The two discovery modes are passive and active. When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients. In active mode, the client initiates the discovery process instead of the AP. Mixed mode refers to network mode settings, and open mode refers to security parameter settings.

  7. Question 7 of 28
    7. Question
    1 points

    Which wireless parameter is used by an access point to broadcast frames that include the SSID?

    Correct

    Incorrect

    The two scanning or probing modes an access point can be placed into are passive or active. In passive mode, the AP advertises the SSID, supported standards, and security settings in broadcast beacon frames. In active mode, the wireless client must be manually configured for the same wireless parameters as the AP has configured.

    Hint

    The two scanning or probing modes an access point can be placed into are passive or active. In passive mode, the AP advertises the SSID, supported standards, and security settings in broadcast beacon frames. In active mode, the wireless client must be manually configured for the same wireless parameters as the AP has configured.

  8. Question 8 of 28
    8. Question
    1 points

    Which device can control and manage a large number of corporate APs?

    Correct

    Incorrect

    A wireless LAN controller (WLC) can be configured to manage multiple lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized management environment.

    Hint

    A wireless LAN controller (WLC) can be configured to manage multiple lightweight access points (LWAPs). On the WLC, a network administrator can configure SSIDs, security, IP addressing, and other wireless network parameters in a centralized management environment.

  9. Question 9 of 28
    9. Question
    1 points

    What is a function of a proxy firewall?

    Correct

    Incorrect

    Proxy firewalls filter traffic through the application layer of the TPC/IP model and shield client information by connecting to remote servers on behalf of clients.

    Hint

    Proxy firewalls filter traffic through the application layer of the TPC/IP model and shield client information by connecting to remote servers on behalf of clients.

  10. Question 10 of 28
    10. Question
    1 points

    What is the role of an IPS?

    Correct

    Incorrect

    For detecting malicious activity, an IPS uses a set of rules called signatures to detect patterns in network traffic.

    Hint

    For detecting malicious activity, an IPS uses a set of rules called signatures to detect patterns in network traffic.

  11. Question 11 of 28
    11. Question
    2 points

    Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)

    Correct

    Incorrect

    Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). TACACS+ supports separation of authentication and authorization processes, while RADIUS combines authentication and authorization as one process. RADIUS supports remote access technology, such as 802.1x and SIP; TACACS+ does not.

    Hint

    Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). TACACS+ supports separation of authentication and authorization processes, while RADIUS combines authentication and authorization as one process. RADIUS supports remote access technology, such as 802.1x and SIP; TACACS+ does not.

  12. Question 12 of 28
    12. Question
    1 points

    What does the TACACS+ protocol provide in a AAA deployment?

    Correct

    Incorrect

    TACACS+ utilizes TCP port 49, provides authorization on a per-user or per-group basis, encrypts the entire packet, and does not provide compa​tibility with previous TACACS protocols.​

    Hint

    TACACS+ utilizes TCP port 49, provides authorization on a per-user or per-group basis, encrypts the entire packet, and does not provide compa​tibility with previous TACACS protocols.​

  13. Question 13 of 28
    13. Question
    1 points

    Which protocol or service allows network administrators to receive system messages that are provided by network devices?

    Correct

    Incorrect

    Cisco developed NetFlow for the purpose of gathering statistics on packets flowing through Cisco routers and multilayer switches. SNMP can be used to collect and store information about a device. Syslog is used to access and store system messages.
    NTP is used to allow network devices to synchronize time settings.

    Hint

    Cisco developed NetFlow for the purpose of gathering statistics on packets flowing through Cisco routers and multilayer switches. SNMP can be used to collect and store information about a device. Syslog is used to access and store system messages.
    NTP is used to allow network devices to synchronize time settings.

  14. Question 14 of 28
    14. Question
    1 points

    Which protocol or service is used to automatically synchronize the software clocks on Cisco routers?

    Correct

    Incorrect

    Network Time Protocol (NTP) is used to allow network devices to synchronize their time settings with a centralized time server. DHCP (Dynamic Host Configuration Protocol) is a protocol which assigns IP addresses to hosts. DNS (Domain Name Service) is a service which resolves host names to IP addresses. SNMP (Simple Network Management Protocol) is a protocol which allows administrators to manage network nodes.

    Hint

    Network Time Protocol (NTP) is used to allow network devices to synchronize their time settings with a centralized time server. DHCP (Dynamic Host Configuration Protocol) is a protocol which assigns IP addresses to hosts. DNS (Domain Name Service) is a service which resolves host names to IP addresses. SNMP (Simple Network Management Protocol) is a protocol which allows administrators to manage network nodes.

  15. Question 15 of 28
    15. Question
    1 points

    Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

    Correct

    Incorrect

    Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.

    Hint

    Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.

  16. Question 16 of 28
    16. Question
    1 points

    Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

    Correct

    Incorrect

    IPsec services allow for authentication, integrity, access control, and confidentiality. With IPsec, the information exchanged between remote sites can be encrypted and verified. Both remote-access and site-to-site VPNs can be deployed using IPsec.

    Hint

    IPsec services allow for authentication, integrity, access control, and confidentiality. With IPsec, the information exchanged between remote sites can be encrypted and verified. Both remote-access and site-to-site VPNs can be deployed using IPsec.

  17. Question 17 of 28
    17. Question
    1 points

    What is a feature of the TACACS+ protocol?

    Correct

    Incorrect

    TACACS+ has the following features:separates authentication and authorization
    encrypts all communication
    uses TCP port 49

    Hint

    TACACS+ has the following features:separates authentication and authorization
    encrypts all communication
    uses TCP port 49

  18. Question 18 of 28
    18. Question
    2 points

    Which two statements are true about NTP servers in an enterprise network? (Choose two.)

    Correct

    Incorrect

    Network Time Protocol (NTP) is used to synchronize the time across all devices on the network to make sure accurate timestamping on devices for managing, securing and troubleshooting. NTP networks use a hierarchical system of time sources. Each level in this hierarchical system is called a stratum. The stratum 1 devices are directly connected to the authoritative time sources.

    Hint

    Network Time Protocol (NTP) is used to synchronize the time across all devices on the network to make sure accurate timestamping on devices for managing, securing and troubleshooting. NTP networks use a hierarchical system of time sources. Each level in this hierarchical system is called a stratum. The stratum 1 devices are directly connected to the authoritative time sources.

  19. Question 19 of 28
    19. Question
    2 points

    What are two uses of an access control list? (Choose two.)

    Correct

    Incorrect

    ACLs can be used for the following:Limit network traffic in order to provide adequate network performance
    Restrict the delivery of routing updates
    Provide a basic level of security
    Filter traffic based on the type of traffic being sent
    Filter traffic based on IP addressing

    Hint

    ACLs can be used for the following:Limit network traffic in order to provide adequate network performance
    Restrict the delivery of routing updates
    Provide a basic level of security
    Filter traffic based on the type of traffic being sent
    Filter traffic based on IP addressing

  20. Question 20 of 28
    20. Question
    1 points

    What is the only attribute used by standard access control lists to identify traffic?

    Correct

    Incorrect

    Standard access control lists can only identify traffic based on the source IPv4 address in the protocol header.

    Hint

    Standard access control lists can only identify traffic based on the source IPv4 address in the protocol header.

  21. Question 21 of 28
    21. Question
    1 points

    Which layer of the hierarchical design model is a control boundary between the other layers?

    Correct

    Incorrect

    The three design layers from lowest to highest are access, distribution, and core. The distribution layer commonly provides policy-based connectivity which permits or denies traffic based on predefined parameters. The distribution layer also acts as a control boundary between the access and core layers.

    Hint

    The three design layers from lowest to highest are access, distribution, and core. The distribution layer commonly provides policy-based connectivity which permits or denies traffic based on predefined parameters. The distribution layer also acts as a control boundary between the access and core layers.

  22. Question 22 of 28
    22. Question
    1 points

    What is true concerning physical and logical topologies?

    Correct

    Incorrect

    Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.

    Hint

    Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.

  23. Question 23 of 28
    23. Question
    1 points

    Refer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?

    CCNA Cybersecurity Operations (Version 1.1) - CyberOps Chapter 5 Exam Answers 2019 Full 100% 01
    CCNA Cybersecurity Operations (Version 1.1) – CyberOps Chapter 5 Exam Answers 2019 Full 100% 01

    Correct

    Incorrect

    A demilitarized zone or DMZ is a network area protected by one or more firewalls. The DMZ typically contains servers that are commonly accessed by external users. A web server is commonly contained in a DMZ.

    Hint

    A demilitarized zone or DMZ is a network area protected by one or more firewalls. The DMZ typically contains servers that are commonly accessed by external users. A web server is commonly contained in a DMZ.

  24. Question 24 of 28
    24. Question
    1 points

    What is the function of the distribution layer of the three-layer network design model?

    Correct

    Incorrect

    The function of the distribution layer is to provide connectivity to services and to aggregate the access layer connections

    Hint

    The function of the distribution layer is to provide connectivity to services and to aggregate the access layer connections

  25. Question 25 of 28
    25. Question
    1 points

    Which LAN topology requires a central intermediate device to connect end devices?

    Correct

    Incorrect

    In a star network topology end devices are connected to a central intermediate device such as a hub or a switch.

    Hint

    In a star network topology end devices are connected to a central intermediate device such as a hub or a switch.

  26. Question 26 of 28
    26. Question
    6 points

    Match each device to a category.

     

    Sort elements
    • PC
    • printer
    • smart device
    • firewall
    • router
    • switch
    • end devices Target
      • end devices Target
        • end devices Target
          • intermediary devices Target
            • intermediary devices Target
              • intermediary devices Target
                Correct

                Incorrect

              • Question 27 of 28
                27. Question
                4 points

                Match the destination network routing table entry type with a defintion.

                 

                Sort elements
                • local route interface
                • directly connected interface
                • dynamic route
                • static route
                • found only in routers running IOS 15+ or IPv6 routing
                  • automatically added when an interface is configured and active
                    • added when a protocol such as OSPF or EIGRP discovers a route
                      • manually configured by a network administrator
                        Correct

                        Incorrect

                      • Question 28 of 28
                        28. Question
                        4 points

                        Match the network security device type with the description.

                         

                        Sort elements
                        • IPS
                        • packet filter firewall
                        • stateful firewall
                        • application gateway
                        • uses signatures to detect patterns in network traffic
                          • enforces an access control policy based on packet content
                            • filters traffic based on defined rules as well as connection context
                              • filters traffic on Layer 7 information
                                Correct

                                Incorrect

                              • CCNA1 v7
                              • CCNA2 v7
                              • CCNA3 v7
                              System Test Exam Answers
                              Modules 1 – 3 Exam Answers
                              Modules 4 – 7 Exam Answers
                              Modules 8 – 10 Exam Answers
                              Modules 11 – 13 Exam Answers
                              Modules 14 – 15 Exam Answers
                              Modules 16 – 17 Exam Answers
                              Practice Final – ITN Answers
                              Course Feedback
                              ITN Practice PT Skills Assessment (PTSA)
                              Final Exam Answers
                              Modules 1 – 4 Exam Answers
                              Modules 5 – 6 Exam Answers
                              Modules 7 – 9 Exam Answers
                              Modules 10 – 13 Exam Answers
                              Modules 14 – 16 Exam Answers
                              ITN Practice Skills Assessment – PT Answers
                              SRWE Practice Skills Assessment – PT Part 1 Answers
                              SRWE Practice Skills Assessment – PT Part 2 Answers
                              SRWE Hands On Skills Exam Answers
                              SRWE Practice Final Exam Answers
                              SRWE Final Exam Answers 
                              Modules 1 – 2 Exam Answers
                              Modules 3 – 5 Exam Answers
                              Modules 6 – 8 Exam Answers
                              Modules 9 – 12 Exam Answers
                              Modules 13 – 14 Exam Answers
                              ITN Practice PT Skills Assessment (PTSA) Answers
                              SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
                              SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
                              ENSA Practice PT Skills Assessment (PTSA) Answers
                              ENSA Hands On Skills Exam Answers
                              Practice Final – ENSA Answers
                              ENSA Final Exam Answers
                              CCNA Certification Practice Exam Answers

                              Copyright © 2023 PressExam.