Test 1 Free CCIE Security Practice Exam Try Free CCIE Security Practice Exam prepared by Certiology Start Exam 1. A protocol that allows data file transfer from one device to another using the connectionless protocol is known as IP TCP DNS TFTP 2. What of the following best describes the execution of applications that monitor and control managed devices? Agent Server Managed device Network management system 3. The configuration register is composed of how many bits? 15 17 20 16 4. What way is used, when the physical access to a router is not possible? Virtual terminal Virtual port Router telnet connection 5. What should a user use for exchanging the information between the NAS and client? Model Encryption method Attributes UDP 6. The large numbers representing the current date and time is termed as Time frame Time Time stamps None 7. Which of the below is described as an author that provides digital certificates and binds data items within a certificate? RSA signatures CA MDS SA 8. UNIS command is composed of how many parts? 1 2 3 4 9. The username or password encryption is supported by Credential Kerberos Packet encryption Packet delivery 10. UNIX operating system was developed in 1989 1969 1959 1979 11. The cisco secure policy manager is also known as Cisco secure intrusion detection system Cisco secure scanner Cisco security manager PIX 12. Internet is an example of Demilitarized zone Advanced security Security Netranger 13. A form of dynamic NAT that maps multiple, unregistered IP addresses to a single registered IP address by using different ports is explained by Static NAT Overloading Overlapping Dynamic NAT 14. Which of the following are the important bodies for the network administrators and the intruders? Newsgroups Internet Internet newsgroups All 15. Which of the following is the component of intrusion detection system? Signature engine PIX DoS IDS Host 16. The developer of SSL HandShake Protocol is Telnet Netscape Communictaions Cisco World wide web 17. Which of the following is used to detect and warn devices of any collisions? TCP IP CSMA/CD None 18. The web browsers, web servers and transfer files makes use of HTTP FTP TFTP DNS 19. What are the main components of the cisco routers? CPU ROM Interfaces All 20. The recovery of the lost password is described as Password recovery Bad password Power cycle NVRAM Loading …