210-260 Implementing Cisco Network Security Practice Exam Set 1

Which of the following is primarily true of SEM systems? (Select the best answer.)


Options are :

  • They perform real-time analysis and detection
  • They analyze log data and report findings.
  • They consolidate logs to a central server
  • They focus on policy and standards compliance.

Answer : They perform real-time analysis and detection

400-101 CCIE Routing and Switching Written Practice Exam Set 4

Which of the following statements is true regarding the outbreak control feature of AMP for Endpoints? (Select the best answer.)


Options are :

  • It must wait for a content update before blocking specific files.
  • It cannot block polymorphic malware.
  • It can use application blocking lists to contain compromised applications.
  • It cannot whitelist specific applications.

Answer : It can use application blocking lists to contain compromised applications.

Which of the following EAP authentication protocols requires both a client and a server digital certificate? (Select the best answer.)


Options are :

  • PEAP
  • EAP-TLS
  • LEAP
  • EAP-FAST

Answer : EAP-TLS

Which of the following can be detected by the Cisco ESA CASE? (Select 2 choices.)


Options are :

  • DDoS attacks
  • MAC spoofing attacks
  • snowshoe spam
  • phishing attacks

Answer : snowshoe spam phishing attacks

210-260 Implementing Cisco Network Security Practice Exam Set 7

Which of the following statements are true regarding TACACS+? (Select 2 choices.)


Options are :

  • It encrypts the entire body of a packet.
  • It provides router command authorization capabilities.
  • It uses UDP for packet delivery.
  • It combines authorization and authentication functions.

Answer : It encrypts the entire body of a packet. It provides router command authorization capabilities.

Which of the following statements is true of all firewalls? (Select the best answer.)


Options are :

  • They maintain a state table.
  • They operate at Layer 7 of the OSI model.
  • They are multihomed devices.
  • They hide the source of network connections.

Answer : They are multihomed devices.

Which of the following statements is true regarding the Cisco IOS Resilient Configuration feature? (Select the best answer.)


Options are :

  • Only remote storage can be used for securing configuration files.
  • Extra space is not required to secure the primary IOS image file.
  • Image or configuration mismatches are not automatically detected.
  • The feature can be disabled remotely.

Answer : Extra space is not required to secure the primary IOS image file.

210-065 Implementing Cisco Video Network Devices Exam Set 6

You issue the following commands on a Cisco router: tacacsserver host ts1 single-connection timeout 20 tacacsserver timeout 30 Which of the following are true about how the Cisco router communicates with the TACACS+ server? (Select 2 choices.)


Options are :

  • The router will maintain an open TCP connection.
  • The router will maintain an open TCP connection for no more than 30 seconds.
  • The router will maintain an open TCP connection for no more than 20 seconds.
  • The router will wait 20 seconds for the server to reply before declaring an error.

Answer : The router will maintain an open TCP connection. The router will wait 20 seconds for the server to reply before declaring an error.

Which of the following statements is true regarding ZFW traffic action characteristics? (Select the best answer.)


Options are :

  • The pass action is bidirectional and automatically permits return traffic.
  • The drop action silently discards packets and does not generate ICMP host unreachable messages.
  • The inspect action is unidirectional and can be used to maintain state information.
  • The pass action can provide an audit trail including session start, stop, and duration values.

Answer : The drop action silently discards packets and does not generate ICMP host unreachable messages.

You want to implement a VPN with an alwayson fail close policy for Cisco AnyConnect clients. Which of the following does Cisco recommend that you do? (Select the best answer.)


Options are :

  • Implement always-on with a fail open policy, and enable the Disconnect button.
  • Start with the fail close policy, and implement fail open as necessary.
  • Implement always-on, and leave the failure policy at the default setting.
  • Start with a fail open policy, and implement fail close in phases.

Answer : Start with a fail open policy, and implement fail close in phases.

300-320 Designing Cisco Network Service Architectures Exam Set 2

Which of the following show clock command output symbols indicates that time reported by the software clock is authoritative but not synchronized with the configured time source? (Select the best answer.)


Options are :

  • ~
  • .
  • *
  • #

Answer : .

Which of the following features prevent attacks that consume CPU and memory resources? (Select 2 choices.)


Options are :

  • CPPr
  • CoPP
  • Memory Threshold Notifications
  • CPU Threshold Notifications

Answer : CPPr CoPP

To ease administrative overhead, you want to add a third party feed to a Security Intelligence device so that the IP addresses of known malicious hosts are automatically blacklisted. However, you have not determined whether the feed is valid. Which of the following are you most likely to do? (Select the best answer.)


Options are :

  • Configure the monitor-only setting, and examine the logs.
  • Implement the feed, and add IP addresses to a custom whitelist as necessary.
  • Configure a custom blacklist that contains only malicious IP addresses.
  • Enforce Security Intelligence filtering by Security Zone

Answer : Configure the monitor-only setting, and examine the logs.

300-320 Designing Cisco Network Service Architectures Exam Set 2

Which of the following are symmetric encryption algorithms? (Select 3 choices.)


Options are :

  • ECC
  • 3DES
  • AES
  • RC4
  • DH

Answer : 3DES AES RC4

Which of the following commands should you issue to allow a packet to exit an ASA through the same interface through which it entered the ASA? (Select the best answer.)


Options are :

  • securitylevel 100
  • samesecuritytraffic permit intrainterface
  • samesecuritytraffic permit interinterface
  • securitylevel 0

Answer : samesecuritytraffic permit intrainterface

You have configured an ASA to accept SSL VPN connections. DTLS and DPD are configured on the ASA. Which of the following is most likely to occur if a Cisco AnyConnect client that is not configured for DTLS attempts to connect to the ASA? (Select the best answer.)


Options are :

  • The client will be able to connect by using TLS and will be able to communicate on the remote network.
  • The client will be able to establish a connection to the ASA but will be unable to communicate on the remote network.
  • The client will still be able to connect by using DTLS and will be able to communicate on the remote network.
  • The client will be unable to establish a connection to the ASA.

Answer : The client will be able to connect by using TLS and will be able to communicate on the remote network.

300-115 Implementing Cisco IP Switched Network Practice Exam Set 1

Which of the following are inband management tools that do not use encryption? (Select 3 choices.)


Options are :

  • Telnet
  • SNMPv1
  • SSH
  • SNMPv3
  • SNMPv2

Answer : Telnet SNMPv1 SNMPv2

You issue the following block of commands on a Cisco router: RouterA(config)#privilege exec level 10 show users RouterA(config)#username boson password cisco RouterA(config)#username boson privilege 15 RouterA(config)#username boson autocommand show users RouterA(config)#line vty 0 4 RouterA(configline)#login local RouterA(configline)#privilege level 7 Which of the following statements accurately describes what happens when the user boson successfully initiates a Telnet session to RouterA? (Select the best answer.)


Options are :

  • The autocommand command succeeds, and the user is not disconnected.
  • The autocommand command fails, and the user is disconnected.
  • The autocommand command succeeds, and the user is disconnected.
  • The autocommand command fails, and the user is not disconnected.

Answer : The autocommand command succeeds, and the user is disconnected.

Which of the following statements are true regarding policies in Cisco Security Manager? (Select 2 choices.)


Options are :

  • Local policies are well-suited to smaller networks and to devices requiring standard configurations.
  • Settings-based policies can define only one set of parameters for each settings based policy defined on a device.
  • Rule-based policies can contain hundreds of rules containing values for the same set of parameters.
  • Any changes that you make to a shared policy are not automatically applied to all the devices to which it is assigned.

Answer : Settings-based policies can define only one set of parameters for each settings based policy defined on a device. Rule-based policies can contain hundreds of rules containing values for the same set of parameters.

Cisco CCNP Route 300-101 Practice Tests Set 5

Which of the following is a Cisco IPS appliance feature that analyzes normal network activity to detect hosts that are infected with worms? (Select the best answer.)


Options are :

  • reputation filtering
  • global correlation
  • anomaly detection
  • a signature definition

Answer : anomaly detection

On which of the following screens in ASDM can you enable users to select which connection profile they will use when they establish a clientless SSL VPN connection? (Select the best answer.)


Options are :

  • the main Connection Profiles pane
  • the Edit User Account dialog box for each user who should be able to select a connection profile
  • the main Group Policies pane
  • the Edit Internal Group Policy dialog box for each group policy that is associated with the clientless SSL VPN connection profiles

Answer : the main Connection Profiles pane

You are configuring dynamic PAT on a Cisco ASA 5500 using the CLI. The ASA is running software version 8.3. Which of the following IP addresses must be configured within a network object or object group? (Select the best answer.)


Options are :

  • inside global
  • outside local
  • outside global
  • inside local

Answer : inside global

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 6

RouterA is configured to establish an IKE tunnel with RouterB. You issue the show crypto isakmp sa command on RouterA and receive the following output: dst src state connid slot 10.1.2.3 10.1.2.4 MM_SA_SETUP 1 0 Which of the following statements is true? (Select the best answer.)


Options are :

  • RouterA has generated a shared secret
  • RouterA has negotiated ISAKMP SA parameters with RouterB.
  • RouterA has generated a shared secret
  • RouterA has exchanged keys with RouterB.

Answer : RouterA has negotiated ISAKMP SA parameters with RouterB.

Which of the following protocols can IPSec use to provide the integrity component of the CIA triad? (Select 2 choices.)


Options are :

  • AES
  • AH
  • GRE
  • ESP

Answer : AH ESP

Which of the following can be installed on a host to analyze and prevent malicious traffic on that host? (Select the best answer.)


Options are :

  • a HIPS
  • a personal firewall
  • a proxy server
  • antivirus software

Answer : a HIPS

200-105 Interconnecting Cisco Networking Devices Part Exam Set 5

The system software on a Cisco Catalyst 3750 series switch was corrupted during a failed upgrade, and now the switch no longer passes the POST on restart. You want to use the Xmodem Protocol to recover the system software. To which of the following ports on the switch could you connect? (Select the best answer.)


Options are :

  • an Ethernet port in the management VLAN
  • the highest numbered Ethernet port on the switch
  • the auxiliary port
  • the console port

Answer : the console port

Which of the following traffic types are blocked by default in a zone-based policy firewall configuration? (Select 2 choices.)


Options are :

  • traffic between interfaces in the same zone
  • traffic between interfaces in different zones
  • traffic to or from the self zone
  • traffic between interfaces in a zone and interfaces not assigned to any zone

Answer : traffic between interfaces in different zones traffic between interfaces in a zone and interfaces not assigned to any zone

Router2 is configured to obtain time from three different NTP servers. You want to determine from which of the three servers Router2 is currently synchronizing time. Which of the following commands would not achieve your goal? (Select the best answer.)


Options are :

  • show ntp associations
  • show ntp associations detail
  • show ntp status
  • show clock detail

Answer : show clock detail

Cisco 300-209 Implementing Secure Mobility Solutions Exam Set 4

Which of the following statements are true regarding IDS devices? (Select 2 choices.)


Options are :

  • They can detect malicious traffic only by signature matching.
  • They can send alerts.
  • They can directly block a virus before it infiltrates the
  • They do not sit inline with the flow of network traffic.

Answer : They can send alerts. They do not sit inline with the flow of network traffic.

Which of the following phishing techniques is most likely to occur as a result of DNS poisoning? (Select the best answer.)


Options are :

  • pharming
  • dumpster diving
  • whaling
  • vishing

Answer : pharming

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions