CCNA Security Practice Test Results

Question 1
68% answer correctly
Which option is the term for what happens when computer code is developed to take advantage of a vulnerability? For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.
An attack
An exploit
A risk
A vulnerability
Question 2
43% answer correctly
You have several operating groups in your enterprise that require differing access restrictions to the routers to perform their job roles. These groups range from Help Desk personnel to advanced troubleshooters. What is one methodology for controlling access rights to the routers in these situations?
Implement syslogging to monitor the activities of the groups
Configure multiple privilege level access
Configure TACACS+ to perform scalable authentication
Configure ACLs to control access for the different groups
Question 3
25% answer correctly
Which statement describes a result of securing the Cisco IOS image using the Cisco IOS image resilience feature?
When the router boots up, the Cisco IOS image is loaded from a secured FTP location.
The Cisco IOS image file is not visible in the output from the show flash command.
The show version command does not show the Cisco IOS image file location.
The running Cisco IOS image is encrypted and then automatically backed up to the NVRAM.
The running Cisco IOS image is encrypted and then automatically backed up to a TFTP server.