CCNA Security v2.0 Chapter 10 Exam Answers

Similar documents
CCNA Security v2.0 Chapter 9 Exam Answers

CCNA Security v2.0 Chapter 3 Exam Answers

2. When logging is used, which severity level indicates that a device is unusable?

CCNA Security v2.0 Chapter 2 Exam Answers

Packet Tracer - Skills Integration Challenge Topology

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100%

SASAC v1.0 Implementing Core Cisco ASA Security Cisco Training

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches?

1. What are two disadvantages of employing teleworkers in an organization? (Choose two.)

1. What is a characteristic of Frame Relay that provides more flexibility than a dedicated line?

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%)

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016

Dolby Conference Phone Support Frequently Asked Questions

2. When an EIGRP-enabled router uses a password to accept routes from other EIGRP-enabled routers, which mechanism is used?

2. Which command can be used to view the cable type that is attached to a serial interface?

CCNA course contents:

CCNA 3 Chapter 8 v5.0 Exam Answers 2015 (100%) CCNA 5 Page 1

Dynamic Storage (ECS)

USER MANUAL. RoomWizard Administrative Console

CCNA 1 Chapter v5.1 Answers 100%

Packet Tracer - Configuring a Zone-Based Policy Firewall (ZPF)

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.

These tasks can now be performed by a special program called FTP clients.

SafeDispatch SDR Gateway for MOTOROLA TETRA

CCNA 1 Chapter v5.1 Answers 100%

Telkom VPN-Lite router setup User Manual Billion 800VGT

CCNA 1 Chapter v5.1 Answers 100%

Knowledge Exchange (KE) System Cyber Security Plan

Apply power, the appliance may be powered by connecting:

1. Which IOS 12.4 software package integrates full features, including voice, security, and VPN capabilities, for all routing protocols?

Exosoft Backup Manager

Launching Xacta 360 Marketplace AMI Guide June 2017

Telkom VPN-Lite router setup User Manual Billion 810VGTX

1. Which organization certifies vendors for adherence to the standards to improve interoperability of products?

CCNA 1 Chapter 1 v5.03 Exam Answers 2016

CCNA 1 v5.1 Practice Final Exam Answers %

Establishing two-factor authentication with FortiGate and HOTPin authentication server from Celestix Networks

Smart Collector Embedded Assistant User Guide

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

Max 8/16 and T1/E1 Gateway, Version FAQs

Please contact technical support if you have questions about the directory that your organization uses for user management.

Cisco Nexus Data Broker Embedded: Implementation Quick- Start Guide

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand

CommandCenter Secure Gateway Release Virtual CC

Hillstone Networks, Inc. StoneOS Cookbook. Version 5.5R1 V4.0

CCNA Voice ICOMM: (4 Day Course)

Software Defined Networking and OpenFlow. Jeffrey Dalla Tezza and Nate Schloss

CaseWare Working Papers. Data Store user guide

BMC Remedyforce Integration with Remote Support

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*

Interoperability between ProCurve WESM zl and HP ipaq Voice Messenger smartphone

Frequently Asked Questions

Investor Services Online Quick Reference Guide FTP Delivery

Admin Report Kit for Exchange Server

Questions and Answers

WDBWL v1.2 Cisco Deploying Basic Wireless LANs

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

File Share Navigator Online

Release Notes System Software

CCNA 3 Practice Final v5.0 Exam Answers 2015 (100%)

Installing AX Server with PostgreSQL

BMC Remedyforce Integration with Bomgar Remote Support

Interoperability between ProCurve WESM zl and Siemens Gigaset SL75 wireless phone

Dear Milestone Customer,

IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016

Stoneware Inc. Citrix NFuse Configuration. Stoneware, Inc. Configuration Sheet Date: January 2005

ROCK-POND REPORTING 2.1

Enterprise Installation

High Security SaaS Concept Software as a Service (SaaS) for Life Science

ABELDent Platform Setup Conventions

Pexip Infinity Secure Mode Deployment Guide

Secure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016

AirWatch Container Admin Guide Configuring and Deploying AirWatch Container

PT Activity 2.6.1: Packet Tracer Skills Integration Challenge

Multi-Session Terminal. 8 concurrent and independent virtual terminals Each virtual terminal can connect automatically. Multi-Host Terminal

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Exercise 1: Deploying Windows Server 2012

Reference Guide. Service Pack 3 Cumulative Update 2. Revision J Issued October DocAve 6: Control Panel

Digital Imaging and Communications in Medicine (DICOM) Supplement 204 TLS Security Profiles

1 Getting and Extracting the Upgrader

Password Reset for Remote Users

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader

DocAve 6 Service Pack 2 Control Panel

WorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation

DIVAR IP 3000 Field Installation Guide

Application Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General

Client Configurations

Model 86A00-2 Home Theater Extender 2 (HTX2)

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Wave IP 4.5. CRMLink Desktop User Guide

I. Introduction: About Firmware Files, Naming, Versions, and Formats

Cloud Storage Migration Suite 1.1.0

Release Notes. Dell SonicWALL Security firmware is supported on the following appliances: Dell SonicWALL Security 200

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide

USER GUIDE. Thanks for purchasing the igate! You ll need to follow these five Configuration Steps to get your igate up and running:

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Transcription:

CCNA Security v2.0 Chapter 10 Exam Answers 1. Which statement describes the functin prvided t a netwrk administratrwh uses the Cisc Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start applicatin? The administratr can cnnect t and manage a single ASA. The administratr can cnnect t and manage multiple ASA devices. The administratr can cnnect t and manage multiple ASA devices and Cisc ruters. The administratr can cnnect t and manage multiple ASA devices, Cisc ruters, and Cisc switches. 2. What is ne benefit f using ASDM cmpared t using the CLI t cnfigure the Cisc ASA? It des nt require any initial device cnfiguratin. It hides the cmplexity f security cmmands. ASDM prvides increased cnfiguratin security. It des nt require a remte cnnectin t a Cisc device. 3. Which type f security is required fr initial access t the Cisc ASDM by using the lcal applicatin ptin? SSL WPA2 crprate bimetric AES 4. Which minimum cnfiguratin is required n mst ASAs befre ASDM can be used? SSH a dedicated Layer 3 management interface a lgical VLAN interface and an Ethernet prt ther than 0/0 Ethernet 0/0 5. What must be cnfigured n an ASA befre it can be accessed by ASDM? web server access Telnet r SSH an Ethernet prt ther than 0/0 Ethernet 0/0 IP address CCNA 5 Page 1

6. Hw is an ASA interface cnfigured as an utside interface when using ASDM? Select a check bx frm the Interface Type ptin that shws inside, utside, and DMZ. Select utside frm the Interface Type drp-dwn menu. Enter the name utside in the Interface Name text bx. Drag the interface t the prt labeled utside in the ASA drawing. 7. Refer t the exhibit. Which Device Management menu item wuld be used t access theasa cmmand line frm within Cisc ASDM? CCNA Security Chapter 10 Exam Answer v2 001 Licensing System Image/Cnfiguratin Management Access Advanced 8. Which ASDM cnfiguratin ptin is used t cnfigure the ASA enable secret passwrd? Device Setup Mnitring Interfaces Device Management CCNA 5 Page 2

9. Refer t the exhibit. Which Device Setup ASDM menu ptin wuld be used t cnfigure the ASA fr an NTP server? CCNA Security Chapter 10 Exam Answer v2 002 Startup Wizard Device Name/Passwrd Ruting Interfaces System Time 10. True r False? The ASA can be cnfigured thrugh ASDM as a DHCP server. false true 11. Which ASDM interface ptin wuld be used t cnfigure an ASA as a DHCP server fr lcal crprate devices? DMZ utside lcal inside 12. Which ASDM cnfiguratin ptin re-encrypts all shared keys and passwrds n an ASA? security master super encryptin master passphrase device prtectin CCNA 5 Page 3

13. Which type f encryptin is applied t shared keys and passwrds when the master passphrase ptin is enabled thrugh ASDM fr an ASA? 3DES public/private key AES 128-bit 14. When the CLI is used t cnfigure an ISR fr a site-t-site VPN cnnectin, which tw items must be specified t enable a crypt map plicy? (Chse tw.) the hash the peer encryptin the ISAKMP plicy a valid access list IP addresses n all active interfaces 15. What is the purpse f the ACL in the cnfiguratin f an ISR site-t-site VPN cnnectin? t permit nly secure prtcls t lg denied traffic t identify the peer t define interesting traffic 16. When ASDM is used t cnfigure an ASA site-t-site VPN, what can be custmized t secure traffic? ISAKMP IKE IKE and ISAKMP preshared key 17. Which VPN slutin allws the use f a web brwser t establish a secure, remte-access VPN tunnel t the ASA? clientless SSL site-t-site using an ACL site-t-site using a preshared key client-based SSL 18. Which remte-access VPN cnnectin allws the user t cnnect by using a web brwser? CCNA 5 Page 4

IPsec (IKEv2) VPN site-t-site VPN clientless SSL VPN IPsec (IKEv1) VPN 19. Which remte-access VPN cnnectin allws the user t cnnect using Cisc AnyCnnect? IPsec (IKEv2) VPN site-t-site VPN clientless SSL VPN IPsec (IKEv1) VPN 20. Which statement describes available user authenticatin methds when using an ASA 5505 device? The ASA 5505 can use either a AAA server r a lcal database. The ASA 5505 nly uses a AAA server fr authenticatin. The ASA 5505 nly uses a lcal database fr authenticatin. The ASA 5505 must use bth a AAA server and a lcal database. 21. Which remte-access VPN cnnectin needs a bkmark list? IPsec (IKEv1) VPN IPsec (IKEv2) VPN site-t-site VPN clientless SSL VPN 22. What ccurs when a user lgs ut f the web prtal n a clientless SSL VPN cnnectin? The brwser cache is cleared. Dwnladed files are deleted. The user n lnger has access t the VPN. The web prtal times ut. 23. If an utside hst des nt have the Cisc AnyCnnect client preinstalled, hw wuld the hst gain access t the client image? The hst initiates a clientless cnnectin t a TFTP server t dwnlad the client. The hst initiates a clientless VPN cnnectin using a cmpliant web brwser t dwnlad the client. The Cisc AnyCnnect client is installed by default n mst majr perating systems. The hst initiates a clientless cnnectin t an FTP server t dwnlad the client. CCNA 5 Page 5

24. What is an ptinal feature that is perfrmed during the Cisc AnyCnnect Secure Mbility Client VPN establishment phase? security ptimizatin hst-based ACL installatin psture assessment quality f service security 25. Which item describes secure prtcl supprt prvided by Cisc AnyCnnect? neither SSL nr IPsec SSL nly bth SSL and IPsec IPsec nly 26. What is the purpse f cnfiguring an IP address pl t be used fr clientbased SSL VPN cnnectins? t assign addresses t the interfaces n the ASA t identify which users are allwed t dwnlad the client image t assign IP addresses t clients when they cnnect t identify which clients are allwed t cnnect CCNA 5 Page 6