PDF Download
CCNA CHAPTER 1 EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -100 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Should carpeting or similar materials should exist in a room with critical network components?
Answer:
No, since they can create static electricity that can damage the components.
Question 2: What does a security policy define, and what is derived from it?
Answer:
What people can and can't do with network components, and a security solution is derived from the security policy.
Question 3: Describe packet-switched services.
Answer:
Packet-switched services are similar to cell-switched services, except where cell-switched services switch fixed-length packets called cells, packet-switched services switch variable-length packets. This feature makes them better suited for data services.
Question 4: Name 5 common network protocols.
Answer:
Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol version 4 (IMAP4), Post Office Protocol 3 (POP3), File Transfer Protocol (FTP), and Hypertext Transfer Protocol (HTTP)
Question 5: Describe the mesh topology in a network environment.
Answer:
It describes how network components are connected together, and can be either full or partial.
Question 6: Describe 3 logical security controls.
Answer:
Idle timeout on logins, passwords, and authentication methods.Question 7: Why should a monitoring system be used to protect against environmental threats?
Answer:
So that an administrator can take immediate action if anomalies occur in temperature or humidity.
Question 8: What are the 2 types of security controls?
Answer:
Physical or logical.
Question 9: What are 4 types of physical installation threats?
Answer:
Hardware, electrical, environmental, and maintenance.Question 10: What are 2 maintenance points about methods to mitigate electrical threats?
Answer:
Mitigation systems should be monitored and periodically tested.
Question 11: What are Wide Area Networks (WAN's) used for?
Answer:
To connect LAN's together, even when they are separated by a large distance.
Question 12: Describe full meshing.
Answer:
Every network component is connected to every other network component.
Question 13: Describe 3 types of network attacks and their solutions, including recommended devices.
Answer:
1) Reconnaissance - Mitigation: ACL's Devices: IPS, IDS, routers 2) Access - Mitigation: Authentication, port security, virtual LANs (VLANs), ACLs, virtual private
networks (VPNs) Devices: Switches, routers, firewalls, IPS, IDS
3) DoS - Mitigation: ACL's Devices: IPS, IDS, firewalls, routers.
Question 14: What is a reconnaissance attack?
Answer:
When an adversary tries to learn information about a network.Question 15: What is the purpose of network filters, such as Access Control Lists?
Answer:
To restrict access to network components and their information, such as only allowing accounting employees access to the accounting server.
Question 16: Describe a star topology.
Answer:
A central device has many point-to-point connections to other components. Star topologies are used in environments where many different devices need to be connected, with a hub or switch at the center of the star.
Question 17: Describe a possible DoS attack scenario.
Answer:
Flooding millions of packets or injecting code into an application or overrunning the buffer(s) of an application, causing it to crash.
Question 18: Describe an insider network attack.
Answer:
An inside adversary attempts to eavesdrop, copy, or cause damage to information, often using a sniffing tool such as Wireshark.
Question 19: Describe a distributed network attack.
Answer:
An adversary introduces code, such as a Trojan horse or back-door program, to a "trusted" component or software that will later be distributed to many other companies and users.
Question 20: What are 2 types of DoS attacks?
Answer:
Flood attacks, such as Internet Control Message Protocol (ICMP) and TCP SYN flooding, as well as buffer overrun attacks Question 21: What is a good encryption solution to guard network login information?
Answer:
"Encrypt information between two network components so that login credentials cannot be viewed; for example, it is better to use SSH instead of telnet for remote access because SSH encrypts the session traffic."
Question 22: Describe 4 physical security controls.
Answer:
Sign in and out logs, locks, guards, and doors.
Question 23: What are 7 networking devices that are used in WAN connections?
Answer:
Cable and DSL modems, carrier switches, CSU/DSU's, firewalls, modems, NT1's, and routers.
Question 24: What is a network Adversary, and give 7 examples.
Answer:
An adversary is a person or persons interested in attacking your network. Common adversaries include disgruntled employees, unskilled and skilled hackers, criminals, other countries, terrorists, and competing companies.
Question 25: How do you mitigate a social engineering attack?
Answer:
Network users should go through proper training about the kinds of information that they can or can't share with other people.
Question 26: How do you reduce the likelihood of hardware threats?
Answer:
Please critical network components in locked rooms that are not accessible by windows, air vents, dropped-down ceilings, or raised flooring.