CCNA SECURITY
₹330.79
CCNA (Security) Interview Q & A Vol 1.0
Description
CCNA (Security) Interview Q & A Vol 1.0
Questions 50
Check the complete list of questions:
- What is the difference between IPS and a firewall?
- What is meant by Annual Loss expectancy? How is ALE calculated?
- What is the difference between IPS and a firewall?
- Which of the following is the global configuration mode command to encrypt any plaintext passwords in a Cisco configuration?
- What is difference between Tacacs and Tacacs+?
- When an IPsec VPN tunnel is configured, how does the router determine what traffic is to traverse the VPN tunnel?
- Which IPsec protocol does both encryption and authentication?
- If you were working in the IOS command – line interface and needed to check on the status of a VPN tunnel, what command would you enter?
- What is the “peer address “when discussing a VPN tunnel?
- What is split tunneling?
- Name a debug command that’s commonly used when troubleshooting VPN connectivity.
- What is the name of the set of both the encryption algorithm and the integrity protocol used in the crypto map?
- What purpose does the preshared key serve?
- What minimum key length is recommended when implementing asymmetric encryption?
- What is difference between asymmetric and Symmetric encryption?
- What is the most widely used standard for digital certificates?
- What is the main use for asymmetric encryption?
- What is IP Spoofing?
- What is the Public Key Encryption?
- What is Worm?
- Define the term DMZ as it pertains to network security, and name 4 different common network devices that are typically found there?
- What are major components of IOS Firewall Set?
- What is CIA?
- What are the meaning of threat, vulnerability, and risk?
- What protocol is responsible to synchronize clocks in a network using syslog?
- Which one of the following is the port used in NTP?
- Which CLI command is similar to the SDM One-Step Lockdown wizard?
- What is difference between networks based Firewall and host based Firewall?
- What is difference between VPN and proxy?
- What global configuration command secures the startup configuration from being erased from NVRAM?
- There are two protocols used by the SDM to retrieve IPS alerts from an ISR. What are these protocols?
- What should be done with services that are not being used on devices? This is a best practice under attack mitigation.
- Which IOS command is used to verify that Cisco IOS images have been properly backed up?
- What is difference between Router and Firewall?
- What are the 2 types of Object groups in Cisco ASA?
- What global config command takes a copy of the running config and securely archives it in storage?
- When does an IDS react to an attack?
- What software utility stealthily scans and sweeps to identify services running on systems in a specified range of IP addresses?
- What IOS command shows real-time detailed information about IKE Phase 1 and IKE Phase 2 negotiations?
- How do you check the status of the tunnel’s phase 1 & 2?
- What product can be considered to be part of the threat containment architecture?
- What is SSL and why is it not enough when it comes to encryption?
- What is the difference between encryption and hashing?
- What is Site to Site and remote access VPN?
- How is traditional firewall different from Next generation Firewall?
- What components are required for a PKI to be successful?
- Which are examples of asymmetric encryption algorithms?
- What do we call a computer virus that combines several different technologies?
- You’ve just configured a VPN tunnel with a remote site. When looking at the output from the show crypto isakmp sa, you notice the message MM_NO_STATE . What might be the probable problem?
- Which modes encrypts the entire packet and adds a new header for IPsec?
Reviews
There are no reviews yet.