1. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets?
vulnerability scanning*
network scanning
integrity checkers
penetration testing
2. How does network scanning help assess operations security?
It can simulate attacks from malicious sources.
It...
Welcome to CCNA v5 and CCNA v5.02 Exam Answer for 2016 - 2017. We are trying the best effort to provide you the best answer for the whole exam from CCNA 1, CCNA 2, CCNA 3, CCNA 4, CCNA Security v1.2 and ITE v5.0 & v5.02 final exam.
CCNA Security v2.0 Chapter 10 Exam 2017
Tuesday, October 25, 2016
1. Which statement describes the function provided to a network administratorwho uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application?
The administrator can connect to and manage a single ASA.*
The administrator can connect to and manage multiple ASA devices.
The administrator can connect to...
CCNA Security 2.0 PT Practice SA Part 1 2015-2016
Friday, October 21, 2016
CCNA Security 2.0 PT Practice SA – Part 1
A few things to keep in mind while completing this activity:
Do not use the browser Back button or close or reload any exam windows during the exam.
Do not close Packet Tracer when you are done. It will close automatically.
Click the Submit Assessment button to submit your work.
Introduction
In...
CCNA Security v2.0 Chapter 9 Exam 2015-2016
Friday, October 21, 2016
1. Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C?
A – DMZ, B – Inside, C – Outside
A – Inside, B – DMZ,...
CCNA Security v2.0 Chapter 8 Exam 2015-2016
Friday, October 21, 2016
1. Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?
It will be sent unencrypted.*
It will be sent encrypted.
It will be blocked.
It will be discarded.
2. What three protocols must be permitted through the company firewall for establishment of IPsec site-to-site...
CCNA Security v2.0 Chapter 7 Exam 2015-2016
Friday, October 21, 2016
1. What is the focus of cryptanalysis?
hiding secret codes
developing secret codes
breaking encrypted codes*
implementing encrypted codes
2. How many bits does the Data Encryption Standard (DES) use for data encryption?
40 bits
56 bits*
64 bits
72 bits
3. Which statement describes the Software-Optimized Encryption Algorithm...
CCNA Security v2.0 Chapter 6 Exam 2015-2016
Friday, October 21, 2016
1. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?
The connection between S1 and PC1 is via a crossover cable.
The Fa0/24 interface of S1 is...
Subscribe to:
Posts (Atom)