0 of 46 Preguntas completed
Preguntas:
Ya has completado el examen anteriormente. Por lo tanto no puedes iniciarlo de nuevo.
Cargando Examen…
Debes iniciar sesión o registrarte para empezar el examen.
En primer lugar debes completar esto:
0 de 46 Preguntas respondidas correctamente
Tu tiempo:
El tiempo ha pasado
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
How do AAA operations compare regarding user identification, user services, and access control?
What is difference between RADIUS and TACACS+?
Which technology is used to improve web traffic performance by proxy caching?
Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?
Which technology prevents client devices from arbitrarily connecting to the network without state remediation?
An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?
Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A accomplishes this task?
Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration failed to work as intended. Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two)
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two)
Refer to the exhibit. What configuration on R1 denies SSH access from PC-1 to any R1 interface and allows all other traffic?
Refer to the exhibit. An administrator configures the following ACL in order to prevent devices on the 192.168.1.0 subnet from accessing the server at 10.1.1.5
Where should the administrator place this ACL for the most efficient use of network resources?
Refer to the exhibit. Which two configurations would be used to create and apply a standard access list on R1, so that only the 10.0.70.0/25 network devices are allowed to access the internal database server? (Choose two)
Refer to the exhibit.
A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?
AAA stands for authentication, authorization, and accounting
Which effect does the aaa new-model configuration command have?
What is the primary difference between AAA authentication and authorization?
Refer to the exhibit. Which password must an engineer use to enter the enable mode?
What is a difference between RADIUS and TACACS+?
How do AAA operations compare regarding user identification, user services and access control?
An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)
Which configuration is needed to generate an RSA key for SSH on a router?
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
Which set of action satisfy the requirement for multi-factor authentication?
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
Refer to the exhibit. An administrator configures four switches for local authentication using passwords that are stored in a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements?
The service password-encryption command is entered on a router. What is the effect of this configuration?
In which two ways does a password manager reduce the chance of a hacker stealing a user’s password? (Choose two)
What are two purposes of launching a reconnaissance attack on a network? (Choose two)
Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using local username and password?
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user’s smartphone being lost or stolen?
Which type of attack can be mitigated by dynamic ARP inspection
Which technology is used to improve web traffic performance by proxy caching?
Which device performs stateful inspection of traffic?
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two)
What is a practice that protects a network from VLAN hopping attacks?
Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?
Refer to the exhibit. What is the effect of this configuration?
Refer to the exhibit. What is the effect of this configuration?
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?
Refer to the exhibit. Which port security violation mode is configured on interface Fa0/1?
Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?
What mechanism carries multicast traffic between remote sites and supports encryption?
What is a function of a remote access VPN?