Certification Exam Prep Questions For Cisco Certified Network Associate


QuickStart is now offering assessment questions for Cisco Certified Network Associate. Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take forCisco Certified Network Associate


Arrow
 

1

If the next hop specified is the IP address of a neighboring router, what is the (default) administrative distance of a static route?

A. 0
Incorrect.
B. 1
Correct!
C. 10
Correct!
D. Infinite
Incorrect.
2

An IPv4address is comprised of how many bits?

A. 32
Correct!
B. 16
Incorrect.
C. 64
Incorrect.
D. 128
Incorrect.
3

Which of the following are classless protocols?(Select 3 answers)

A. IGRP
Incorrect.
B. EIGRP
Correct!
C. OSPF
Correct!
D. RIPv2
Correct!
4

How many subnets and hosts per subnet are possible with 172.16.1.0 as the network address with 255.255.255.224 as the subnet mask?

5

IPv4 and IPv6 use how many bits for addressing?

A. 16, 64
Incorrect.
B. 16, 128
Incorrect.
C. 32, 64
Incorrect.
D. 32, 128
Correct!
6

Cisco Next Generation Intrusion Prevention System (NGIPS) devices include global correlation capabilities that utilize real-world data from Cisco Talos. To leverage global correlation in blocking traffic, what should be configured on the NGIPS?

A. Reputation filtering
Correct!
B. Policy-based IPS
Incorrect.
C. Signature-based IPS
Incorrect.
D. Anomaly-based IPS
Incorrect.
7

Which of the following tool or method can be used to validate the identity of other organizations based on their domain name when receiving and sending email?

A. PEM
Incorrect.
B. S/MIME
Incorrect.
C. DKIM
Correct!
D. MOSS
Incorrect.
8

Cisco offers a cloud-based service for IPS correlation. What is this service better known as?

A. SIO
Correct!
B. WSA
Incorrect.
C. ESA
Incorrect.
D. ISO
Incorrect.
9

Network Address Translation (NAT) offers translation of addresses from internal addresses (private) to external address (public) space. Which form of NAT offers multiple inside devices communication with the Internet, yet optimizes the number of global addresses required?

A. NAT-T
Incorrect.
B. PAT
Correct!
C. NAT-Multiple
Incorrect.
D. PAT-T
Incorrect.
10

Cisco WSA can be deployed in which two modes?(Select 2 answers)

A. Standalone
Incorrect.
B. Combined proxy
Incorrect.
C. Transparent proxy
Correct!
D. Explicit proxy
Correct!
11

In an organization dealing with financial transactions, as a result of a latest risk assessment exercise, the recommendation is to upgrade the perimeter security at the data center. The cost of upgrading security is inline with the security budget, and the organization’s stakeholders have decided go ahead with the recommendation. Which risk control best describes the decision taken by the stakeholders?

A. Transfer the risk
Incorrect.
B. Avoid the risk
Incorrect.
C. Mitigate the risk
Correct!
D. Accept the risk
Incorrect.
12

CIA triad defines the cornerstone for information security. Which of the following constitutes the CIA triad?

13

As a result of the latest risk assessment exercise, an organization that deals with financial transactions receives the recommendation to upgrade access security at the data center. The cost of upgrading security, however, outweighs the cost to benefit factor, and the organization’s stakeholders have decided not to go ahead with the recommendation. Which of the following options describes the decision taken by the stakeholders?

A. Transfer the risk
Incorrect.
B. Avoid the risk
Incorrect.
C. Mitigate the risk
Incorrect.
D. Accept the risk
Correct!
14

What is the process of removing superfluous programs and/or services installed on an operating system (OS) known as?

A. Patching
Incorrect.
B. Exploit scanning
Incorrect.
C. Vulnerability management
Incorrect.
D. Hardening
Correct!
15

What best describes the situation where there is a probability of adverse effects from an apparent threat?

A. Risk
Correct!
B. Threat vector
Incorrect.
C. Exposure
Incorrect.
D. Exploit
Incorrect.
16

Who is ultimately responsible for the security of data?

17

Which of the following Mandatory Access Control (MAC) labels is appropriate for ordinarily available data?

A. Confidential
Incorrect.
B. Public
Correct!
C. Sensitive
Incorrect.
D. Secret
Incorrect.
18

What does CER, FAR, and FRR in the following figure signify?

19

What type of security controls are used to thwart possible threats and attacks, even before they can be realized by the perpetrator?

A. Corrective
Incorrect.
B. Deterrent
Correct!
C. Response
Incorrect.
D. Recovery
Incorrect.
20

What type of access control allows the owner of a file to grant other users access to it using an access control list?

A. Role based
Incorrect.
B. Nondiscretionary
Incorrect.
C. Attribute based
Incorrect.
D. Discretionary
Correct!
21

Which of the following are commercially available Security Incident and Event Management (SIEM) systems?

22

What type of PKI trust model is portrayed by following figure?

A. Hierarchical
Incorrect.
B. Mesh
Correct!
C. Hybrid
Incorrect.
D. Circular
Incorrect.
23

An organization wants to set up the wireless network using Cisco gear. The IT director wants to leverage the existing database for authenticating internal users. Which authentication mechanisms can be used to set up secure authentication and allow leveraging Single Sign-On (SSO) for a wireless network?(Select 2 answers)

A. LDAP
Correct!
B. RADIUS
Correct!
C. WPA2-PSK
Incorrect.
D. WEP
Incorrect.
24

Security Assertion Markup Language (SAML) is most commonly used in cloud and web-based environments. In the context of SSO capability, which of the following statements is true?

25

Which of the following is based on a client/server protocol aimed to allow network access servers to authenticate remote and local users by sending access request messages to a central server?

A. RADIUS
Correct!
B. EAP
Incorrect.
C. Kerberos
Incorrect.
D. OAuth
Incorrect.
26

Which of the following statements correctly describes the functions of CRL and OCSP in the context of revocation of certificate(s)?

27

In an organization, a CA has been deployed with multiple subordinate CAs. What would be the best PKI trust model to be adopted by this organization?

A. Mesh
Incorrect.
B. Hierarchical
Correct!
C. Bridged
Incorrect.
D. Linked
Incorrect.
28

What PKI model does the following figure signify?

A. Meshed
Incorrect.
B. Bridged
Incorrect.
C. Hierarchical
Correct!
D. This is not a valid PKI trust model.
Incorrect.
29

In a PKI setup, which of the following operations are accurate?

30

Which of the following are most commonly used protocols or mechanisms to protect data in motion?

Product Image

Cisco Certified Network Associate

Self-Paced

Learning Style

Practice Exam

Learning Style

Beginner

Difficulty

1 Hour

Course Duration

Course Info

Download PDF

Certificate

See Sample

Buy Individually
tab
About Individual Course:
  • Individual course plan gives you access to this course
$109.00
$109.00
/ Each
0 Learners Have Enrolled For This Course

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

Outline

More Information

More Information
Lab AccessNo
Learning StyleSelf-Paced Learning
Learning TypePractice Exam
DifficultyBeginner
Course Duration1 Hour
LanguageEnglish

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

This Subscription Includes:

Information
Virtual instructor Led

Virtual Classroom Courses

Our virtual instructor-led courses give you access to live instructors training you with other live students in a virtual classroom environment.

200+ Virtual Classroom Courses
Information
Self-Paced

Online Self-Paced Courses

Take self-paced online courses at your convenience and own pace, with unlimited access to courses in various emerging technologies.

700+ Self-Paced Courses
Information
College

E-books blogs, case studies, ariticles

As part of informal learning, our platform will recommend E-books, whitepapers, case studies, articles, and videos. This is AI curated content closely aligned with your learning objectives.

E-books blogs, case studies,...
Information
College

College Accredited Courses

QuickStart courses are accredited by several top schools and universities, including Texas A&M and University of Phoenix. You can print out certificates and also apply them towards your degree plan with them.

College Accredited
Information
Dashboard

Full Learning Dashboard & Analytics

Access all your enrolled, completed, course statistics, and community discussions from one centralized and intuitive learning dashboard with built in analytics, course tracking, time spent, and more.

Analytics/Reporting
Information
Social

QuickStart Discussions

Engage with other learners where you can directly chat, ask questions, and socialize with other learners experts and instructors on a course subject.

Community Access Community Access
Information
Labs

Virtual Labs

Videos and lectures only go so far. Get real world, hands-on practice with virtual labs (not available for all courses).

Virtual Labs Virtual Labs
Information
Live Instructor Support

Live Instructor Mentoring & Support

Get your IT problems solved through a community of mentors, experts and peers. Get live help from experts to answer questions on course material or guidance on a project.

Mentoring & Discussions Mentoring & Discussions
Information
Dashboard

Career Paths

Start a learning pathway towards understanding and mastering your career. With QuickStart career paths, you can fully understanding and being the best in your field.

Learning Paths Learning Paths
Information
Dashboard

Informal Learning

Access to AI curated content from various content publishers which can help in self-directed learning.

Informal Learning Informal Learning
click here