CCNA Security Pre-Assessment

CCNA Security Pre-Assessment

Professional Development

15 Qs

quiz-placeholder

Similar activities

Cycle 4: Session 8 Review.

Cycle 4: Session 8 Review.

Professional Development

12 Qs

Day 1 - Basics of Java

Day 1 - Basics of Java

Professional Development

14 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

Roblox z Lua 10-12 - II QUIZ

Roblox z Lua 10-12 - II QUIZ

Professional Development

10 Qs

C programming_Shivank

C programming_Shivank

Professional Development

20 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

Cloud computing

Cloud computing

Professional Development

10 Qs

CHFI-Post-Assessment

CHFI-Post-Assessment

Professional Development

10 Qs

CCNA Security Pre-Assessment

CCNA Security Pre-Assessment

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Omantel Ohi

Used 86+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol is responsible for synchronizing clocks in the network?

SMTP
NTP
VTP
FTP

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which network security objective deals with providing secured access?

Confidentiality
Integrity
Availability
None of the above

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which level of protection is assigned to “enable secret” password in the configuration of Cisco IOS Devices?

0
5
7
6

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which version of SNMP provides authentication and privacy of management traffic?

SNMPv1
SNMPv2
SNMPv2c
SNMPv3

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the biggest drawback to using Asymmetric encryption algorithm?

Less Security
Slow computing time
Greater Key Length
Difficulty in Administration

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The enable secret command is used to secure access to which CLI mode?

user EXEC mode
global configuration mode
privileged EXEC mode
auxiliary setup mode

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which IPsec security protocol should be used when confidentiality is required?

AH
MD5
PSK
ESP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?