CCNA Security Flashcards
Which two services define cloud networks? (Choose two.)
A. Infrastructure as a Service B. Platform as a Service C. Security as a Service D. Compute as a Service E. Tenancy as a Service
Infrastructure as a Service
Platform as a Service
The NIST’s definition of cloud computing defines the service models as follows:[2] + Software as a
Service (SaaS). The capability provided to the consumer is to use the provider’s applications running
on a cloud infrastructure. The applications are accessible from various client devices through either a
thin client interface, such as a web browser (e.g., web-based email), or a program interface. The
consumer does not manage or control the underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual application capabilities, with the possible
exception of limited user-specific application configuration settings.
+ Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud
infrastructure consumer-created or acquired applications created using programming languages,
libraries, services, and tools supported by the provider. The consumer does not manage or control
the underlying cloud infrastructure including network, servers, operating systems, or storage, but has
control over the deployed applications and possibly configuration settings for the application-hosting
environment.
+ Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing resources where the consumer is
able to deploy and run arbitrary software, which can include operating systems and applications. The
consumer does not manage or control the underlying cloud infrastructure but has control over
operating systems, storage, and deployed applications; and possibly limited control of select
networking components (e.g., host firewalls).
In which two situations should you use out-of-band management? (Choose two.)
A. when a network device fails to forward packets
B. when you require ROMMON access
C. when management applications need concurrent access to the device
D. when you require administrator access from multiple locations
E. when the control plane fails to respond
When a network device fails to forward packets
When you require ROMMON access
OOB management is used for devices at the headquarters and is accomplished by connecting
dedicated management ports or spare Ethernet ports on devices directly to the dedicated OOB
management network hosting the management and monitoring applications and services. The OOB
management network can be either implemented as a collection of dedicated hardware or based on
VLAN isolation.
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
A. TACACS uses TCP to communicate with the NAS.
B. TACACS can encrypt the entire packet that is sent to the NAS.
C. TACACS supports per-command authorization.
D. TACACS authenticates and authorizes simultaneously, causing fewer packets to be transmitted.
E. TACACS uses UDP to communicate with the NAS.
F. TACACS encrypts only the password field in an authentication packet.
TACACS uses TCP to communicate with the NAS.
TACACS can encrypt the entire packet that is sent to the NAS.
TACACS supports per-command authorization.
According to Cisco best practices, which three protocols should the default ACL allow on an access
port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose
three.)
A. BOOTP B. TFTP C. DNS D. MAB E. HTTP F. 802.1x
BOOTP
TFTP
DNS
ACLs are the primary method through which policy enforcement is done at access layer switches for
wired devices within the campus.
ACL-DEFAULT–This ACL is configured on the access layer switch and used as a default ACL on the
port. Its purpose is to prevent un-authorized access.
An example of a default ACL on a campus access layer switch is shown below:
Extended IP access list ACL-DEFAULT
10 permit udp any eq bootpc any eq bootps log (2604 matches) 20 permit udp any host 10.230.1.45
eq domain
30 permit icmp any any
40 permit udp any any eq tftp
50 deny ip any any log (40 matches)
As seen from the output above, ACL-DEFAULT allows DHCP, DNS, ICMP, and TFTP traffic and denies
everything else.
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
A. AES B. 3DES C. DES D. MD5 E. DH-1024 F. SHA-384
AES
SHA-384
The Suite B next-generation encryption (NGE) includes algorithms for authenticated encryption,
digital signatures, key establishment, and cryptographic hashing, as listed here:
+ Elliptic Curve Cryptography (ECC) replaces RSA signatures with the ECDSA algorithm + AES in the
Galois/Counter Mode (GCM) of operation
+ ECC Digital Signature Algorithm
+ SHA-256, SHA-384, and SHA-512
Which three ESP fields can be encrypted during transmission? (Choose three.)
A. Security Parameter Index B. Sequence Number C. MAC Address D. Which three ESP fields can be encrypted during transmission? (Choose three.) A. Security Parameter Index B. Sequence Number C. MAC Address D. Padding E. Pad Length F. Next Header E. Pad Length F. Next Header
Padding
Pad Length
Next Header
The packet begins with two 4-byte fields (Security Parameters Index (SPI) and Sequence Number).
Following these fields is the Payload Data, which has substructure that depends on the choice of
encryption algorithm and mode, and on the use of TFC padding, which is examined in more detail
later. Following the Payload Data are Padding and Pad Length fields, and the Next Header field. The
optional Integrity Check Value (ICV) field completes the packet.
Source: https://tools.ietf.org/html/rfc4303#page-14
What are two default Cisco IOS privilege levels? (Choose two.)
A. 0 B. 1 C. 5 D. 7 E. 10 F. 15
1
15
By default, the Cisco IOS software command-line interface (CLI) has two levels of access to
commands: user EXEC mode (level 1) and privileged EXEC mode (level 15).
Which two authentication types does OSPF support? (Choose two.)
A. plaintext B. MD5 C. HMAC D. AES 256 E. SHA-1 F. DES
plaintext
MD5
These are the three different types of authentication supported by OSPF + Null Authentication–This
is also called Type 0 and it means no authentication information is included in the packet header. It is
the default.
+ Plain Text Authentication–This is also called Type 1 and it uses simple clear-text passwords.
+ MD5 Authentication–This is also called Type 2 and it uses MD5 cryptographic passwords.
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)
A. QoS B. traffic classification C. access lists D. policy maps E. class maps F. Cisco Express Forwarding
QoS
traffic classification
For example, you can specify that management traffic, such as SSH/HTTPS/SSL and so on, can be
ratelimited (policed) down to a specific level or dropped completely.
Another way to think of this is as applying quality of service (QoS) to the valid management traffic
and policing to the bogus management traffic.
Which two statements about stateless firewalls are true? (Choose two.)
A. They compare the 5-tuple of each incoming packet against configurable rules.
B. They cannot track connections.
C. They are designed to work most efficiently with stateless protocols such as HTTP or HTTPS.
D. Cisco IOS cannot implement them because the platform is stateful by nature.
E. The Cisco ASA is implicitly stateless because it blocks all traffic by default.
They compare the 5-tuple of each incoming packet
They cannot track connections.