CCNA SECURITY
$3.99
CCNA (Security) Interview Q & A Vol 1.0

Description
CCNA (Security) Interview Q & A Vol 1.0
Questions 50
Check the complete list of questions:
- What is the difference between IPS and a firewall?
 - What is meant by Annual Loss expectancy? How is ALE calculated?
 - What is the difference between IPS and a firewall?
 - Which of the following is the global configuration mode command to encrypt any plaintext passwords in a Cisco configuration?
 - What is difference between Tacacs and Tacacs+?
 - When an IPsec VPN tunnel is configured, how does the router determine what traffic is to traverse the VPN tunnel?
 - Which IPsec protocol does both encryption and authentication?
 - If you were working in the IOS command – line interface and needed to check on the status of a VPN tunnel, what command would you enter?
 - What is the “peer address “when discussing a VPN tunnel?
 - What is split tunneling?
 - Name a debug command that’s commonly used when troubleshooting VPN connectivity.
 - What is the name of the set of both the encryption algorithm and the integrity protocol used in the crypto map?
 - What purpose does the preshared key serve?
 - What minimum key length is recommended when implementing asymmetric encryption?
 - What is difference between asymmetric and Symmetric encryption?
 - What is the most widely used standard for digital certificates?
 - What is the main use for asymmetric encryption?
 - What is IP Spoofing?
 - What is the Public Key Encryption?
 - What is Worm?
 - Define the term DMZ as it pertains to network security, and name 4 different common network devices that are typically found there?
 - What are major components of IOS Firewall Set?
 - What is CIA?
 - What are the meaning of threat, vulnerability, and risk?
 - What protocol is responsible to synchronize clocks in a network using syslog?
 - Which one of the following is the port used in NTP?
 - Which CLI command is similar to the SDM One-Step Lockdown wizard?
 - What is difference between networks based Firewall and host based Firewall?
 - What is difference between VPN and proxy?
 - What global configuration command secures the startup configuration from being erased from NVRAM?
 - There are two protocols used by the SDM to retrieve IPS alerts from an ISR. What are these protocols?
 - What should be done with services that are not being used on devices? This is a best practice under attack mitigation.
 - Which IOS command is used to verify that Cisco IOS images have been properly backed up?
 - What is difference between Router and Firewall?
 - What are the 2 types of Object groups in Cisco ASA?
 - What global config command takes a copy of the running config and securely archives it in storage?
 - When does an IDS react to an attack?
 - What software utility stealthily scans and sweeps to identify services running on systems in a specified range of IP addresses?
 - What IOS command shows real-time detailed information about IKE Phase 1 and IKE Phase 2 negotiations?
 - How do you check the status of the tunnel’s phase 1 & 2?
 - What product can be considered to be part of the threat containment architecture?
 - What is SSL and why is it not enough when it comes to encryption?
 - What is the difference between encryption and hashing?
 - What is Site to Site and remote access VPN?
 - How is traditional firewall different from Next generation Firewall?
 - What components are required for a PKI to be successful?
 - Which are examples of asymmetric encryption algorithms?
 - What do we call a computer virus that combines several different technologies?
 - You’ve just configured a VPN tunnel with a remote site. When looking at the output from the show crypto isakmp sa, you notice the message MM_NO_STATE . What might be the probable problem?
 - Which modes encrypts the entire packet and adds a new header for IPsec?
 
		




Reviews
There are no reviews yet.