Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

CCNA CyberOps Chapter 8 Exam Online

Last Updated on May 20, 2021 by Admin

CCNA CyberOps Chapter 8 Exam Online

CCNA CyberOps 1.1 -- Chapter 8 Exam

Time limit: 0

Quiz-summary

0 of 21 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21

Information

CCNA CyberOps 1.1 — Chapter 8 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 21 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  1. Answered
  2. Review
  1. Question 1 of 21
    1. Question
    3 points

    In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)

    Correct

    Incorrect

    In order to prepare for a security attack, IT security personnel must identify assets that need to be protected such as servers, routers, access points, and end devices. They must also identify potential threats to the assets and vulnerabilities in the system or design.

    Hint

    In order to prepare for a security attack, IT security personnel must identify assets that need to be protected such as servers, routers, access points, and end devices. They must also identify potential threats to the assets and vulnerabilities in the system or design.

  2. Question 2 of 21
    2. Question
    2 points

    Which two areas must an IT security person understand in order to identify vulnerabilities on a network? (Choose two.)

    Correct

    Incorrect

    In order to identify security vulnerabilities, a cybersecurity expert must understand the applications being used and their associated vulnerabilities, as well as the hardware used.

    Hint

    In order to identify security vulnerabilities, a cybersecurity expert must understand the applications being used and their associated vulnerabilities, as well as the hardware used.

  3. Question 3 of 21
    3. Question
    1 points

    Which device is usually the first line of defense in a layered defense-in-depth approach?

    Correct

    Incorrect

    The edge router connects an organization to a service provider. The edge router has a set of rules that specify which traffic is allowed or denied.

    Hint

    The edge router connects an organization to a service provider. The edge router has a set of rules that specify which traffic is allowed or denied.

  4. Question 4 of 21
    4. Question
    1 points

    How does BYOD change the way in which businesses implement networks?​

    Correct

    Incorrect

    A BYOD environment requires an organization to accommodate a variety of devices and access methods. Personal devices, which are not under company control, may be involved, so security is critical. Onsite hardware costs will be reduced, allowing a business to focus on delivering collaboration tools and other software to BYOD users.

    Hint

    A BYOD environment requires an organization to accommodate a variety of devices and access methods. Personal devices, which are not under company control, may be involved, so security is critical. Onsite hardware costs will be reduced, allowing a business to focus on delivering collaboration tools and other software to BYOD users.

  5. Question 5 of 21
    5. Question
    1 points

    What component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?

    Correct

    Incorrect

    Security policies specify requirements and provide a baseline for organizations. Security policies may include the following:
    Identification and authentication policies that specify authorized individuals that have access to network resources and verification procedures
    Password policies that ensure minimum requirements are met and authentication methods are being enforced and updated
    Remote access policies that identify how remote users can access a network and to what they are allowed to connect
    Acceptable use policies that identify network applications and network usage that are allowed within the organization

    Hint

    Security policies specify requirements and provide a baseline for organizations. Security policies may include the following:
    Identification and authentication policies that specify authorized individuals that have access to network resources and verification procedures
    Password policies that ensure minimum requirements are met and authentication methods are being enforced and updated
    Remote access policies that identify how remote users can access a network and to what they are allowed to connect
    Acceptable use policies that identify network applications and network usage that are allowed within the organization

  6. Question 6 of 21
    6. Question
    1 points

    Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

    Correct

    Incorrect

    The identification and authentication policy section of the security policy typically specifies authorized persons that can have access to network resources and identity verification procedures.

    Hint

    The identification and authentication policy section of the security policy typically specifies authorized persons that can have access to network resources and identity verification procedures.

  7. Question 7 of 21
    7. Question
    3 points

    What three items are components of the CIA triad? (Choose three.)

    Correct

    Incorrect

    The CIA triad contains three components: confidentiality, integrity, and availability. It is a guideline for information security for an organization.

    Hint

    The CIA triad contains three components: confidentiality, integrity, and availability. It is a guideline for information security for an organization.

  8. Question 8 of 21
    8. Question
    1 points

    What is the purpose of mobile device management (MDM) software?

    Correct

    Incorrect

    Mobile device management (MDM) software is used with mobile devices so that corporate IT personnel can track the devices, implement security settings, as well as control software configurations.

    Hint

    Mobile device management (MDM) software is used with mobile devices so that corporate IT personnel can track the devices, implement security settings, as well as control software configurations.

  9. Question 9 of 21
    9. Question
    1 points

    A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

    Correct

    Incorrect

    Confidentiality ensures that data is accessed only by authorized individuals. Authentication will help verify the identity of the individuals.

    Hint

    Confidentiality ensures that data is accessed only by authorized individuals. Authentication will help verify the identity of the individuals.

  10. Question 10 of 21
    10. Question
    1 points

    A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

    Correct

    Incorrect

    Availability ensures that network services are accessible and performing well under all conditions. By load balancing the traffic destined to the main web servers, in times of a huge volume of visits the systems will be well managed and serviced.

    Hint

    Availability ensures that network services are accessible and performing well under all conditions. By load balancing the traffic destined to the main web servers, in times of a huge volume of visits the systems will be well managed and serviced.

  11. Question 11 of 21
    11. Question
    1 points

    Which type of access control applies the strictest access control and is commonly used in military or mission critical applications?

    Correct

    Incorrect

    Access control models are used to define the access controls implemented to protect corporate IT resources. The different types of access control models are as follows:Mandatory access control (MAC) – The strictest access control that is typically used in military or mission critical applications.
    Discretionary access control (DAC) – Allows users to control access to their data as owners of that data. Access control lists (ACLs) or other security measures may be used to specify who else may have access to the information.
    Non-discretionary access control – Also known as role-based access control (RBAC). Allows access based on the role and responsibilities of the individual within the organization.
    Attribute-based access control (ABAC) – Allows access based on the attributes of the resource to be accessed, the user accessing the resource, and the environmental factors such as the time of day.

    Hint

    Access control models are used to define the access controls implemented to protect corporate IT resources. The different types of access control models are as follows:Mandatory access control (MAC) – The strictest access control that is typically used in military or mission critical applications.
    Discretionary access control (DAC) – Allows users to control access to their data as owners of that data. Access control lists (ACLs) or other security measures may be used to specify who else may have access to the information.
    Non-discretionary access control – Also known as role-based access control (RBAC). Allows access based on the role and responsibilities of the individual within the organization.
    Attribute-based access control (ABAC) – Allows access based on the attributes of the resource to be accessed, the user accessing the resource, and the environmental factors such as the time of day.

  12. Question 12 of 21
    12. Question
    1 points

    Which method is used to make data unreadable to unauthorized users?

    Correct

    Incorrect

    Network data can be encrypted using various cryptography applications so that the data is made unreadable to unauthorized users. Authorized users have the cryptography application so the data can be unencrypted.

    Hint

    Network data can be encrypted using various cryptography applications so that the data is made unreadable to unauthorized users. Authorized users have the cryptography application so the data can be unencrypted.

  13. Question 13 of 21
    13. Question
    1 points

    What is the principle of least privilege access control model?

    Correct

    Incorrect

    The principle of least privilege is an access control model that specifies a limited and as-needed approach to user access to data.

    Hint

    The principle of least privilege is an access control model that specifies a limited and as-needed approach to user access to data.

  14. Question 14 of 21
    14. Question
    1 points

    A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

    Correct

    Incorrect

    After a user is successfully authenticated (logged into the server), the authorization is the process of determining what network resources the user can access and what operations (such as read or edit) the user can perform.

    Hint

    After a user is successfully authenticated (logged into the server), the authorization is the process of determining what network resources the user can access and what operations (such as read or edit) the user can perform.

  15. Question 15 of 21
    15. Question
    1 points

    Which statement describes a difference between RADIUS and TACACS+?

    Correct

    Incorrect

    TACACS+ uses TCP, encrypts the entire packet (not just the password), and separates authentication and authorization into two distinct processes. Both protocols are supported by the Cisco Secure ACS software.

    Hint

    TACACS+ uses TCP, encrypts the entire packet (not just the password), and separates authentication and authorization into two distinct processes. Both protocols are supported by the Cisco Secure ACS software.

  16. Question 16 of 21
    16. Question
    1 points

    Which technology provides the framework to enable scalable access security?

    Correct

    Incorrect

    AAA network security services (authentication, authorization, and accounting) provide the primary framework to set up access control on a network device. It provides a higher degree of scalability than the con, aux, vty and privileged EXEC authentication commands alone by using centrally managed Cisco Secure ACS servers using TACACS+ and RADIUS protocols.

    Hint

    AAA network security services (authentication, authorization, and accounting) provide the primary framework to set up access control on a network device. It provides a higher degree of scalability than the con, aux, vty and privileged EXEC authentication commands alone by using centrally managed Cisco Secure ACS servers using TACACS+ and RADIUS protocols.

  17. Question 17 of 21
    17. Question
    1 points

    Which AAA component can be established using token cards?

    Correct

    Incorrect

    The authentication component of AAA is established using username and password combinations, challenge and response questions, and token cards. The authorization component of AAA determines which resources the user can access and which operations the user is allowed to perform. The accounting and auditing component of AAA keeps track of how network resources are used.

    Hint

    The authentication component of AAA is established using username and password combinations, challenge and response questions, and token cards. The authorization component of AAA determines which resources the user can access and which operations the user is allowed to perform. The accounting and auditing component of AAA keeps track of how network resources are used.

  18. Question 18 of 21
    18. Question
    1 points

    What service determines which resources a user can access along with the operations that a user can perform?

    Correct

    Incorrect

    Authorization determines whether a user has certain access privileges.

    Hint

    Authorization determines whether a user has certain access privileges.

  19. Question 19 of 21
    19. Question
    3 points

    Which three services are provided by the AAA framework? (Choose three.)

    Correct

    Incorrect

    The authentication, authorization, and accounting (AAA) framework provides services to help secure access to network devices.

    Hint

    The authentication, authorization, and accounting (AAA) framework provides services to help secure access to network devices.

  20. Question 20 of 21
    20. Question
    1 points

    In threat intelligence communications, what set of specifications is for exchanging cyberthreat information between organizations?

    Correct

    Incorrect

    The two common threat intelligence-sharing standards are as follows:
    Structured Threat Information Expression (STIX) – This is a set of specifications for exchanging cyberthreat information between organizations. The Cyber Observable Expression (CybOX) standard has been incorporated into STIX.
    Trusted Automated Exchange of Indicator Information (TAXII) – This is the specification for an application layer protocol that allows the communication of CTI over HTTPS. TAXII is designed to support STIX.

    Hint

    The two common threat intelligence-sharing standards are as follows:
    Structured Threat Information Expression (STIX) – This is a set of specifications for exchanging cyberthreat information between organizations. The Cyber Observable Expression (CybOX) standard has been incorporated into STIX.
    Trusted Automated Exchange of Indicator Information (TAXII) – This is the specification for an application layer protocol that allows the communication of CTI over HTTPS. TAXII is designed to support STIX.

  21. Question 21 of 21
    21. Question
    3 points

    Match the type of business policy to the description.

     

    Sort elements
    • defines system requirements and objectives, rules, and requirements for users when they attach to or on the network
    • protects the rights of workers and the company interests
    • identifies salary, pay schedule, benefits, work schedule, vacations, etc.
    • security
      • company
        • employee
          Correct

          Incorrect

        • CCNA1 v7
        • CCNA2 v7
        • CCNA3 v7
        System Test Exam Answers
        Modules 1 – 3 Exam Answers
        Modules 4 – 7 Exam Answers
        Modules 8 – 10 Exam Answers
        Modules 11 – 13 Exam Answers
        Modules 14 – 15 Exam Answers
        Modules 16 – 17 Exam Answers
        Practice Final – ITN Answers
        Course Feedback
        ITN Practice PT Skills Assessment (PTSA)
        Final Exam Answers
        Modules 1 – 4 Exam Answers
        Modules 5 – 6 Exam Answers
        Modules 7 – 9 Exam Answers
        Modules 10 – 13 Exam Answers
        Modules 14 – 16 Exam Answers
        ITN Practice Skills Assessment – PT Answers
        SRWE Practice Skills Assessment – PT Part 1 Answers
        SRWE Practice Skills Assessment – PT Part 2 Answers
        SRWE Hands On Skills Exam Answers
        SRWE Practice Final Exam Answers
        SRWE Final Exam Answers 
        Modules 1 – 2 Exam Answers
        Modules 3 – 5 Exam Answers
        Modules 6 – 8 Exam Answers
        Modules 9 – 12 Exam Answers
        Modules 13 – 14 Exam Answers
        ITN Practice PT Skills Assessment (PTSA) Answers
        SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
        SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
        ENSA Practice PT Skills Assessment (PTSA) Answers
        ENSA Hands On Skills Exam Answers
        Practice Final – ENSA Answers
        ENSA Final Exam Answers
        CCNA Certification Practice Exam Answers

        Copyright © 2023 PressExam.