CCNA Security Practice Test Results

Question 1
83% answer correctly
Which option is the term for a weakness in a system or its design that can be exploited by a threat?
An attack
A vulnerability
An exploit
A risk
Question 2
36% answer correctly
Which of the following is true of an IDS?
Only supports signatures to look for an attack
Uses IP logging to send alerts
Implements blocking to stop an attacker
Uses inline mode
Question 3
47% answer correctly
When implementing network security, what is an important configuration task that you should perform to assist in correlating network and security events?
Configure an automated network monitoring system for event correlation.
Configure Network Time Protocol.
Configure synchronized syslog reporting.
Configure a common repository of all network events for ease of monitoring.