200-125 Cisco Certified Network Associate Practice Exam Set 5

A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?


Options are :

  • Implement preventative measures
  • Establish a plan of action to resolve the problem
  • Re-establish a new theory or escalate
  • Document findings, actions, and outcomes

Answer : Re-establish a new theory or escalate

Which of the following encryption standards is found on older wireless devices and provides minimal security?


Options are :

  • WPA
  • WPA2
  • WEP
  • AES

Answer : WEP

Which of the following security threats is BEST mitigated through proper user training?


Options are :

  • A Worm
  • Browser Adware
  • Rootkits
  • Social Engineering

Answer : Social Engineering

200-105 Interconnecting Cisco Networking Devices Part Exam Set 3

Which of the following security controls would be an example of the least privilege principle on a home PC?


Options are :

  • Disable the firewall for online gaming.
  • Create a standard user account for kids.
  • Store all financial data in a separate folder.
  • Install antispyware on the PC.

Answer : Create a standard user account for kids.

Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?


Options are :

  • MSCONFIG >Startup Tab
  • Disable the Guest account
  • Restrict user permissions
  • Rename the Administrator account
  • Disable autorun

Answer : Disable autorun

Which of the following is TRUE about the difference between a worm and a virus?


Options are :

  • Viruses hide in the boot record while worms hide within the file system.
  • Worms are written in assembly while viruses are written with scripting languages.
  • Viruses disable the antivirus update service while worms kill the antivirus process.
  • Worms self propagate while viruses need human intervention to replicate.

Answer : Worms self propagate while viruses need human intervention to replicate.

300-320 Designing Cisco Network Service Architectures Exam Set 2

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?


Options are :

  • Enable static IP addresses
  • Disable the SSID from broadcasting
  • Change to user MAC filtering
  • Change default usernames and passwords

Answer : Change default usernames and passwords

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?


Options are :

  • Change the SSID to reflect the business name instead of a public access point.
  • Adjust the radio power so that coverage is restricted to the business.
  • Enable MAC filtering and restrict access to other company's devices.
  • Configure the access point encryption from unsecured access to WEP.

Answer : Adjust the radio power so that coverage is restricted to the business.

A user receives a phone call from a person claiming to be from technical support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?


Options are :

  • Malware
  • Phishing
  • Virus
  • Social engineering

Answer : Social engineering

210-065 Implementing Cisco Video Network Devices Exam Set 3

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).


Options are :

  • Time of day restrictions
  • Anti-malware
  • A,C
  • Mantraps
  • Employee badges
  • User training
  • Paper shredding

Answer : A,C

A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).


Options are :

  • Change the SSID
  • Change the default username
  • Disable DHCP
  • Install antivirus applications
  • Disable the guest account
  • A,E

Answer : A,E

When securing a new wireless router, which of the following should be changed FIRST?


Options are :

  • Default password
  • Default SSID
  • Radio power levels
  • DHCP settings

Answer : Default password

100-105 Net Cert Interconnecting Cisco Networking Exam Set 1

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).


Options are :

  • A,C
  • Update router firmware
  • Set encryption on the router
  • Change router default logins
  • Change the security settings on their computer
  • Change the encryption on the computer's wireless adapter

Answer : A,C

Which of the following security threats requires the attacker to be physically located near the target machine?


Options are :

  • Phishing
  • Shoulder surfing
  • Social engineering
  • Rootkit

Answer : Shoulder surfing

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?


Options are :

  • Change the router's default admin name and password.
  • Place the router in a locked room.
  • Enable WPA2 wireless encryption.
  • Disable the router's remote management feature.

Answer : Place the router in a locked room.

Cisco 210-060 Implement Collaboration Device Practice Exam Set 3

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?


Options are :

  • Most privilege
  • Allow all
  • Least privilege
  • Deny all

Answer : Least privilege

A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?


Options are :

  • Disabling the SSID broadcast
  • Turning down the radio power level
  • Setting a high encryption level
  • Enabling MAC filtering

Answer : Enabling MAC filtering

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?


Options are :

  • Message of the Day
  • Regular user education
  • Company forums
  • Email lists

Answer : Regular user education

200-125 Cisco Certified Network Associate Practice Exam Set 3

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?


Options are :

  • Malware infection
  • Shoulder surfing
  • Phishing attack
  • Social engineering

Answer : Social engineering

Phishing is:


Options are :

  • A technique used to obtain financial information from a user by compiling information from social networks and their friends.
  • A technique used to obtain financial information from a user mimicking a legitimate website.
  • An infection that causes a computer to behave erratically by playing music and launching browser windows.
  • An infection that causes a web browser to go to a different site than the one intended from a search result page.

Answer : A technique used to obtain financial information from a user mimicking a legitimate website.

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?


Options are :

  • Enable MAC filtering
  • Enable Windows automatic updates
  • Enable screensaver required passwords
  • Enable wireless encryption

Answer : Enable screensaver required passwords

200-105 Interconnecting Cisco Networking Devices Part Exam Set 5

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?


Options are :

  • Windows password
  • MAC address filtering
  • Proper SSID
  • SSL certificate

Answer : Proper SSID

Which of the following features helps to prevent shoulder surfing?


Options are :

  • Native resolution
  • Auto adjust
  • Degaussing
  • Privacy screen

Answer : Privacy screen

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).


Options are :

  • D,F
  • Block the application in Windows Firewall
  • Change network location to Work
  • Disable all wireless network connections
  • Remove shortcuts to the application
  • Reroute the web address in HOSTS file
  • Configure the workstation for a static IP

Answer : D,F

300-320 Designing Cisco Network Service Architectures Exam Set 7

A computer program that functions normally while quietly installing malicious software on a machine is known as a:


Options are :

  • Phishing attack.
  • DDoS attack.
  • Trojan.
  • Worm.

Answer : Trojan.

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?


Options are :

  • Door locks
  • Mantraps
  • Retinal scanners
  • Smart card badges

Answer : Mantraps

Which of the following identifies traffic based upon its physical network address?


Options are :

  • MAC filtering
  • Geotracking
  • Hashing
  • Phishing

Answer : MAC filtering

200-310 Designing for Cisco Inter network Solutions Exam Set 4

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?


Options are :

  • Recovery console
  • System restore
  • Anti-malware software
  • Factory pre-installation

Answer : Anti-malware software

An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?


Options are :

  • Implement a written policy addressing the issue for all users.
  • Prevent remote logins to all network shares and drives.
  • Monitor access to the network shares using SNMP.
  • Set up shares with permissions based upon group membership.

Answer : Set up shares with permissions based upon group membership.

Which of the following security threats does NOT use software to extract sensitive information or credentials?


Options are :

  • Man-in-the-Middle exploits
  • Shoulder surfing
  • Malware
  • Grayware

Answer : Shoulder surfing

400-101 CCIE Routing and Switching Written Practice Exam Set 8

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions