Network Device Security Quiz (ENCOR / CCNP)

Please enter your email:

1. Which of these is correct method to assign an Access Control List to a physical interface?

 
 
 
 

2. Phishing falls under which type of Security attacks?

 
 
 
 

3. What will be the final result of this ACL:

#access-list 1 deny host 172.0.0.1
#access-list 1 permit host 172.0.0.1

 
 
 
 

4. What are the individual entries in Access Control Lists called?

 
 
 
 

5. How can we best prevent Data Loss Layer2 attacks?

 
 
 
 

6. Which type of ACL is this?

#access-list 1 deny   host 10.0.0.1
#access-list 1 permit 10.0.0.0 0.0.0.255
#access-list 1 permit 192.168.0.0 0.0.255.255

 
 
 
 

7. Which of these is correct method to assign ACL to Telnet?

 
 
 
 

8. Which type of ACL is this?

#access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80
#access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443
#access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443

 
 
 
 

9. Which type of Security architecture (security system) is this?

 
 
 
 

10. When implementing port security, which command allows pre-defined quantity of MAC addresses?

 
 
 
 

 

 

 

 

 

Also check our free Online Quizzes on all IT topics and CCNA, CCNP, CCIE including new Python Automation Programming.

Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+)

You can also view free study notes (Cheat sheets) on all IT and Cisco CCNA/CCNP/CCIE topics for long term memory:

Networkwalks Summary Cheatsheets

 

 

Follow our Facebook Page & YouTube Channel for more updated Cheatsheets & Quizzes:

 

0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments