Wgu Ccna
10 community-sourced questions and answers. Free — no login.
[CCNA Security 210-260] CH1 - Q2 Which asset characteristic refers to risk that results from a threat and lack of countermeasure ? a) High Availability b) Liability c) Threat Prevention d) Vulnerability
Vulnerability - asset characteristic refers to risk that results from a threat and lack of countermeasure. Vulnerabilities are an exploitable weakness of some type. [CCNA Security 210-260] Key Topic: CH 1 Table 1-2 Vulnerability CH 1 - Q2 Ans: D
[CCNA Security 210-260] CH1 - Q1 Which Security term refers to a person, property, or data of value to a company? a) Risk b) Asset c) Threat Prevention d) Mitigation Technique
Asset - person, property, or information/data of value to a company. Assets are items to be protected by a company and can include intangible items (trade secrets, proprietary information, and internal records like $$$.) [CCNA Security 210-260] Key Topic: CH 1 Table 1-2 Asset CH 1 - Q1 Ans: B
Government Classifications - Unclassified Sensitive but unclassified (SBU) Confidential Secret Top Secret (Note: FOUO - is NOT a Government Classification) [CCNA Security 210-260] Section: Classifying Assets Key Topic: CH 1 pg 9 CH 1 - Q4 Ans: B, D
[CCNA Security 210-260] CH1 - Q4 Which data classification label is used not found in a government organization? a) Unclassified b) Classified but not important c) Sensitive but unclassified d) For Official Use Only e) Secret
[CCNA Security 210-260] CH1 - Q3 Which three items are the primary network security objective for a company ? a) Revenue generation b) Confidentiality c) Integrity d) Availability
The 3 Basic Network Security Objectives - Confidentiality, Integrity, Availability (C.I.A.) Confidentiality - means only authorized individuals or systems can view sensitive or classified information. Integrity - means that changes made are only done by authorized individuals or systems. Availability - systems and data/Information are available to authorized users and groups. [CCNA Security 210-260] Section: Confidentiality, Integrity, Availability Key Topic: CH 1 pg 6 CH 1 - Q3 Ans: B,C,D
[CCNA Security 210-260] CH1 - Q5 Which of the following represents a physical control? a) Change control policy b) Background checks c) Electronic lock d) Access lists
Physical Countermeasures - physical security for the infrastructure, network servers and equipment. [CCNA Security 210-260] Section: Classifying Countermeasures Key Topic: CH 1 pg 11 CH 1 - Q5 Ans: C
[CCNA Security 210-260] CH1 - Q6 What is the primary motivation for most attacks against networks today? a) Political b) Financial c) Theological d) Curiosity
The primary motivation for most attacks against networks today is Financial gain, theft of information, and espionage. [CCNA Security 210-260] Section: Recognizing Current network Threats pg 12 (last paragraph) CH 1 - Q6 Ans: B
[CCNA Security 210-260] CH1 - Q7 Which type of an attack involves lying about the source address of a frame or packet? a) Man-in-the-middle attack b) Denial-of-service attack c) Reconnaissance attack d) Spoofing attack
Spoofing attack/ARP poisoning attack - involves lying about the source address of a frame or packet Note: Layer 2 - ARP poisoning (Frame) Note: Layer 3 - IP Spoofing (Packet) [CCNA Security 210-260] Section: Attack Vectors Key Topic: Man-in-the-Middle Attacks Note: NOT defined in book chapter! (alluded) CH 1 - Q7 Ans: D
Campus-Area Network (CAN) - CH1 See Figure 1-1 Small office/Home Office (SOHO) - CH1 See Figure 1-3 Wide-Area Newtork (WAN) - CH1 See Figure 1-2 Virtualized Data Center - CH1 See figure 1-6 & 1-7 Note: Pay attention to the devices in each figure (FW, MDM, AD, IPS, IDS, Switches, routers, Data Centers, Authentication devices etc.) [CCNA Security 210-260] Section: Applying Fundamental Security Principles to Network Design Key Topic: Network Topologies pg 17-22 Note: This question is not addressed in the book text. CH 1 - Q9 Ans: B,D
[CCNA Security 210-260] CH1 - Q9 Which of the following might you find in a network that is based on a defense-in-depth security implementation? (chose all that apply) a) Firewall b) IPS (Intrusion Prevention System) c) Access lists d) Current patches on servers
[CCNA Security 210-260] CH1 - Q8 Which two approaches to security provide the most secure results on day one? a) Role based b) Defense in depth c) Authentication d) Least privilege
Guidelines for Secure Network Architecture
[CCNA Security 210-260] CH1 - Q10 In relation to production networks, which of the following are viable options when dealing with risk? (Chose all that apply) a) Ignore it b) Transfer it c) Mitigate it d) Remove it
Dealing with risk: remove it - eliminate/delete the problem. transfer it - outsource risk/responsibility mitigate it - manage risk, and reduce risk (Note: remove it - is Not usually a good option) [CCNA Security 210-260] Section: What Do We Do with the Risk? CH1 - Q10 Ans: B,C,D
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials