Test 5 20 Free CCIE Security Practice Test and Exam Questions Try 20 Free CCIE Security Practice Test and Exam Questions prepared by Certiology Start Test and Exam Questions 1. the information processed at the Data link layer is termed as Flow control Error notifications Data reliability Frames 2. Which of the following makes use of CSMA/CD for the transmission of frames on the wires? Internet Protocols Ethernet All 3. Which of the below is configured on the end systems that allow communication between hosts? TCP IP Router All 4. Which of the following best handles the Data and code formatting? Application Layer Presentation layer Data link layer None 5. Which layer describes the bit ordering standards, connector types and the bit transmission rates? Layer 1 Layer 3 Layer 2 Layer 6 6. The path to a destination is best determined by Physical layer Application Layer Data Link Layer Network Layer 7. Which of the following port is not active and does not participate in spanning tree? Listening Blocking Disabled Learning 8. Which of the following is used in the environments where the bandwidth is not an issue? TCP DNS TFTP URL 9. Which of the following is classified as an applictaion based solution? SSL SNMP 11000 Series Secure Content Accelerator All 10. What is the default port number used by udp-port? 80 100 162 None 11. What is the device called that collects the information from remote devices? SNMP servers SNMP agents SNMP UDP ports 12. Which type of Cisco hardware stores the copy of the router’s configuration file? Random Access memory Read only memory Non volatile RAM None 13. Which of the following tells the router to load configuration from NVRAM? Bit 4 Bit 5 Bit 1 Bit 6 14. Which of the following are the modes of Cisco router? Configuration mode Initial configuration mode ROM boot mode All the above 15. Which of the following is the client based system? RADIUS ISDN dialup IOS Authentication 16. ASCII login is similar to PPP PPP CHAP PAP NAS 17. Which type of attack is prevented by IKE when messages are constructed with unique cookies that can identify and reject invalid messages? Man in the middle Denial of service Access lists Deny statement 18. Which of the following commands provides a method to define static routing entries? Route Arp-a Nbtstat Ping 19. Firewalls are accomplished through Invisibility Authorize traffic Immune from penetration All the above 20. Which of the following models are supported by Cisco? PIX 535 PIX 525 PIX501 All Loading …