CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full PDF
CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full PDF
Questions Bank IOS Commands Help Resources » IP Subnet Calculators » Donations Search the site
CCNA v6 » CCNA v7 » IT Essentials 7.0 » CCNA Security v2.0 » CCNA Cyber Ops » CCNP » Linux »
Questions Bank CCNA v6 » CCNA v7 » IT Essentials 7.0 » CCNA Security v2.0 » CCNA Cyber Ops » CCNP »
Linux » IOS Commands Help Resources » Download Cisco Packet Tracer » IP Subnet Calculators » Donation Contact
intercity.technology OPEN
CCNA Cyber Ops Exam Answers
Cyber Ops – Chapter 1 Exam
Share Tweet Share Pin it Reddit Cyber Ops – Chapter 2 Exam
Cyber Ops – Chapter 3 Exam
5 / 5 ( 2 votes ) Cyber Ops – Chapter 4 Exam
Cyber Ops – Chapter 5 Exam
Cyber Ops – Chapter 6 Exam
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the Cyber Ops – Chapter 7 Exam
question to find that question/answer. Cyber Ops – Chapter 8 Exam
Cyber Ops – Chapter 9 Exam
Cyber Ops – Chapter 10 Exam
NOTE: If you have the new question on this test, please comment Question Cyber Ops – Chapter 11 Exam
and Multiple-Choice list in form below this article. We will update answers Cyber Ops – Chapter 12 Exam
for you in the shortest time. Thank you! We truly value your contribution to Cyber Ops – Chapter 13 Exam
the website. Cyber Ops – Practice Final Exam
Cyber Ops – FINAL Exam
Dump – SECFND (210-250) Certification
1. What specialized network device is responsible for enforcing access control
Dump – SECOPS (210-255) Certification
policies between networks?
Bridge
Switch Donation by
Firewall * Amount:
IDS
C. Firewalls are used to permit or block traffic between networks according to Donate!
access control policies.
Recent Comments
2. What information does an Ethernet switch examine and use to build its
address table?
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 1/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
Smart device
PC
Server
Firewall *
Cyber
D. An intermediary device sends network messages toward a final destination.
Examples of intermediary devices include a firewall, router, switch, multilayer Vulnerability
switch, and wireless router.
Assessment
4. Which statement describes a difference between RADIUS and TACACS+? titania.com
C. TACACS+ uses TCP, encrypts the entire packet (not just the password), and
separates authentication and authorization into two distinct processes. Both
protocols are supported by the Cisco Secure ACS software.
OPEN
5. Which wireless parameter refers to the frequency bands used to transmit data
to a wireless access point?
SSID
Security mode
Scanning mode
Channel settings *
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 2/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
8. Which network service synchronizes the time across all devices on the
network?
NetFlow
Syslog
NTP *
SNMP
C. There are two methods that can be used to set date and time settings on
network devices. Manual configuration and automatically using the Network Time
Protocol (NTP). NTP keeps the time across all devices synchronized by using a
hierarchical system of sources.
10. What are two types of addresses found on network end devices? (Choose
two.)
UDP
return
IP
TCP
MAC
Intermediary devices use two types of addresses when sending messages to the
final destination device, MAC and IP addresses. TCP and UDP are protocols used
at Layer 4 to identify what port numbers are being used on the source and
destination devices. A return address is used when mailing a letter, not in
networking.
11. Which OSI layer header is rewritten with new addressing information by a
router when forwarding between LAN segments?
Layer 2
Layer 3
Layer 4
Layer 7
When a router forwards traffic between LAN segments it encapsulates the Layer 2
frame to determine the Layer 3 path. Once the Layer 3 path is determined, the
router encapsulates the Layer 3 packet in a new Layer 2 frame with new Layer 2
addressing infomation for the destination LAN segment.
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 3/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
13. What are two uses of an access control list? (Choose two.)
ACLs can control which areas a host can access on a network.
ACLs provide a basic level of security for network access.
Standard ACLs can restrict access to specific applications and ports.
ACLs can permit or deny traffic based upon the MAC address originating on the
router.
ACLs assist the router in determining the best path to a destination.
ACLs can be used for the following:Limit network traffic in order to provide
adequate network performance
Restrict the delivery of routing updates
Provide a basic level of security
Filter traffic based on the type of traffic being sent
Filter traffic based on IP addressing
15. What is the only attribute used by standard access control lists to identify
traffic?
source MAC address
protocol type
source IP address
source TCP port
Standard access control lists can only identify traffic based on the source IPv4
address in the protocol header.
The two scanning or probing modes an access point can be placed into are
passive or active. In passive mode, the AP advertises the SSID, supported
standards, and security settings in broadcast beacon frames. In active mode, the
wireless client must be manually configured for the same wireless parameters as
the AP has configured.
17. A Cisco router is running IOS 15. What are the two routing table entry types
that will be added when a network administrator brings an interface up and
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 4/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
A local route interface routing table entry is found when a router runs IOS 15 or
higher or if IPv6 routing is enabled. Whenever an interface is addressed and
enabled (made active), a directly connected interface is automatically shown in the
routing table.
18. Refer to the exhibit. The network “A” contains multiple corporate servers that
are accessed by hosts from the Internet for information about the corporation.
What term is used to describe the network marked as “A”?
For detecting malicious activity, an IPS uses a set of rules called signatures to
detect patterns in network traffic.
20. Which two features are included by both TACACS+ and RADIUS protocols?
(Choose two.)
SIP support
password encryption
802.1X support
separate authentication and authorization processes
utilization of transport layer protocols
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 5/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
The SSID is used to name a wireless network. This parameter is required in order
for a wireless client to attach to a wireless AP.
23. What information within a data packet does a router use to make forwarding
decisions?
the destination service requested
the destination IP address
the destination host name
the destination MAC address
25. Which two statements are true about NTP servers in an enterprise network?
(Choose two.)
NTP servers at stratum 1 are directly connected to an authoritative time
source.
NTP servers ensure an accurate time stamp on logging and debugging
information.
There can only be one NTP server on an enterprise network.
All NTP servers synchronize directly to a stratum 1 time source.
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 6/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
NTP servers control the mean time between failures (MTBF) for key network
devices.
Network Time Protocol (NTP) is used to synchronize the time across all devices
on the network to make sure accurate timestamping on devices for managing,
securing and troubleshooting. NTP networks use a hierarchical system of time
sources. Each level in this hierarchical system is called a stratum. The stratum 1
devices are directly connected to the authoritative time sources.
27. Which layer of the hierarchical design model is a control boundary between
the other layers?
access
network
distribution
core
The three design layers from lowest to highest are access, distribution, and core.
The distribution layer commonly provides policy-based connectivity which permits
or denies traffic based on predefined parameters. The distribution layer also acts
as a control boundary between the access and core layers.
Proxy firewalls filter traffic through the application layer of the TPC/IP model and
shield client information by connecting to remote servers on behalf of clients.
30. What is the function of the distribution layer of the three-layer network
design model?
aggregating access layer connections
providing high speed connection to the network edge
providing secure access to the Internet
providing direct access to the network
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 7/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
32. Which device can control and manage a large number of corporate APs?
switch
WLC
router
LWAP
33. For which discovery mode will an AP generate the most traffic on a WLAN?
active mode
mixed mode
passive mode
open mode
The two discovery modes are passive and active. When operating in passive
mode, an AP will generate more traffic as it continually broadcasts beacon frames
to potential clients. In active mode, the client initiates the discovery process
instead of the AP. Mixed mode refers to network mode settings, and open mode
refers to security parameter settings.
like
Like 51 tweet
Tweet share
Share 51 errorfol
share
Share
or wait 394s
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 8/9
6/6/2020 CCNA Cyber Ops (Version 1.1) - Chapter 5 Exam Answers Full
Related Articles
{}
Name*
Post Comment
Email*
0 COMMENTS
https://itexamanswers.net/ccna-cyber-ops-chapter-5-exam-answers-full.html 9/9