Trang

Ads by google

CCNAS Final Exam CCNA Security 1.0 2012 100%-CCNAS Final Exam – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012

Tuesday, July 31, 2012
1. What will be disabled as a result of the no service password-recovery command ?aaa new-model global configuration command.change to the configuration register.password encryption service.ability to access ROMmon.2. What occurs after RSA keys are generated on a Cisco router to prepare for secure device management?All vty ports are automatically configured for SSH to provide secure management.The general-purpose key size must...
Read more ...

CCNAS Chapter 9 CCNA Security 1.0 2012 100%-CCNAS Chapter 9 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012

Tuesday, July 31, 2012
1. Which three statements describe ethics in network security? (Choose three.)principles put into action in place of lawsfoundations for current lawsset of moral principles that govern civil behaviorstandard that is higher than the lawset of regulations established by the judiciary systemset of legal standards that specify enforceable actions when the law is broken2. Which component of the security policy lists specific websites,...
Read more ...

CCNAS Chapter 7 CCNA Security 1.0 2012 100%-CCNAS Chapter 7 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012

Tuesday, July 31, 2012
1. Which symmetrical encryption algorithm is the most difficult to crack?3DESAESDESRSASHA2. What is the basic method used by 3DES to encrypt plaintext?The data is encrypted three times with three different keys.The data is encrypted, decrypted, and encrypted using three different keys.The data is divided into three blocks of equal length for encryption.The data is encrypted using a key length that is three times longer than the...
Read more ...

CCNAS Chapter 8 CCNA Security 1.0 2012 100%-CCNAS Chapter 8 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012

Tuesday, July 31, 2012
1. Which IPsec protocol should be selected when confidentiality is required?tunnel modetransport modeauthentication headerencapsulating security payloadgeneric routing encapsulation2. When using ESP tunnel mode, which portion of the packet is not authenticated?ESP headerESP trailernew IP headeroriginal IP header.3. When configuring an IPsec VPN, what is used to define the traffic that is sent through the IPsec tunnel and protected...
Read more ...

CCNAS Chapter 6 CCNA Security 1.0 2012 100%-CCNAS Chapter 6 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012

Tuesday, July 31, 2012
1. Which two measures are recommended to mitigate VLAN hopping attacks? (Choose two.)Use a dedicated native VLAN for all trunk ports.Place all unused ports in a separate guest VLAN.Disable trunk negotiation on all ports connecting to workstations.Enable DTP on all trunk ports.Ensure that the native VLAN is used for management traffic.2. As a recommended practice for Layer 2 security, how should VLAN 1 be treated?All access ports...
Read more ...

CCNAS Chapter 4 CCNA Security 1.0 2012 100%-CCNAS Chapter 4 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012

Tuesday, July 31, 2012
1. Which statement accurately describes Cisco IOS zone-based policy firewall operation?The pass action works in only one direction.A router interface can belong to multiple zones.Service policies are applied in interface configuration mode.Router management interfaces must be manually assigned to the self zone.2.Which location is recommended for extended numbered or extended named ACLs?a location as close to the destination of...
Read more ...

CCNAS Chapter 5 CCNA Security 1.0 2012 100%-CCNAS Chapter 5 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012

Tuesday, July 31, 2012
1. An IPS sensor has detected the string confidential across multiple packets in a TCP session. Which type of signature trigger and signature type does this describe?Trigger: Anomaly-based detectionType: Atomic signatureTrigger: Anomaly-based detectionType: Composite signatureTrigger: Pattern-based detectionType: Atomic signatureTrigger: Pattern-based detectionType: Composite signatureTrigger: Policy-based detectionType: Atomic...
Read more ...