Sponsor

Advertisment

CCNA Security v2.0 Chapter 4 Exam 2015-2016

Monday, September 5, 2016
1. Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address 10.0.0.3, source port 23, and destination port 2447, what does the Cisco IOS firewall do with the packet? The initial packet is dropped, but subsequent packets are forwarded. The packet is forwarded, and an...
Read more ...

CCNA Security v2.0 Chapter 3 Exam 2015-2016

Monday, September 5, 2016
1. Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this? accounting accessibility auditing authorization* authentication   2. Why is authentication with AAA preferred over a local database method? It provides a fallback authentication method if the administrator forgets...
Read more ...

CCNA Security v2.0 Chapter 2 Exam 2015-2016

Monday, September 5, 2016
1. An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) Enable inbound vty SSH sessions.* Generate two-way pre-shared keys. Configure DNS on the router. Configure the IP domain...
Read more ...

CCNA Security v2.0 Chapter 1 Exam 2015-2016

Monday, September 5, 2016
1. What method can be used to mitigate ping sweeps? using encrypted or hashed authentication protocols installing antivirus software on hosts deploying antisniffer software on all network devices blocking ICMP echo and echo-replies at the network edge*   2. What are the three major components of a worm attack? (Choose three.) a penetration mechanism an infecting vulnerability a payload* an enabling vulnerability* a probing...
Read more ...