CCNA Security Practice Exam 3 IINS 640-554 CCNA Security Practice Exam 3 IINS 640-554 What is the primary motivation for most attacks against networks today? a) Political b) Financial c) Theological d) Curiosity Which one prevents a brute-force attack on your router by setting a minimum timeĀ to wait before login commands would be accepted after a failed attempt? a) login block-for b) login delay c) login wait d) login wait attempt ARP spoofing attacks depend on the use of what message? a) CDP updates b) NTP c) GARP d) MAC Cisco recommends which SNMP on your network if you need it? a) Version 1 b) Version 2 c) Version 3 d) Version 4 These are all features of digital signatures except a) Integrity b) Confidentiality c) Nonrepudiation d) Authentication A major disadvantage to using asymmetric encryption algorithms is a) reduced security b) Slow computing c) Greater key length d) makes administration harder Which of the following indirectly needs the administrator to configure a host name? a) Telnet b) HTTP c) HTTPS d) SSH _________ Represents a physical control? a) Change control policy b) Background checks c) Electronic lock d) Access lists What function also secures a hash? a) MAC b) MD5 c) HMAC d) HMC In terms of access list placement, which is true a) A standard list should be placed as close to the destination as possible. b) An extended list should be placed as close to the source as possible. c) Both d) Neither Loading … Question 1 of 10