Экономика
Экономика
Экономика
Select one:
Which type of security policy includes defined rules and procedures for creating and maintaining
password security?
Select one:
end-user policy
technical policy
governing policy
What type of network security test can detect and report changes made to network systems?
Select one:
vulnerability scanning
integrity checking
penetration testing
network scanning
What component of a security policy explicitly defines the type of traffic allowed on a network and
what users are allowed and not allowed to do?
Select one:
password policies
Which solution allows workers to telecommute effectively and securely?
Select one:
dial-up connection
DSL connection
remote-access VPN
site-to-site VPN
In the prosecution of an individual, what answers the question of why the individual committed an
illegal act?
Select one:
means
opportunity
motive
complexity
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
Select one:
management
routing
VPN connectivity
NAT
What type of network security test can detect and report changes made to network systems?
Select one:
integrity checking
penetration testing
vulnerability scanning
network scanning
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
What is the most trustworthy security level that can be configured on an ASA device interface?
Select one:
100
50
255
What type of security test uses simulated attacks to determine possible consequences of a real
threat?
Select one:
vulnerability scanning
penetration testing
network scanning
integrity checking
In the prosecution of an individual, what answers the question of why the individual committed
an illegal act?
Select one:
opportunity
complexity
motive
means
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Select one:
Select one:
routing
NAT
VPN connectivity
management
Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)
standards
procedures
risk assessment
best practices
asset inventory
guidelines
By default, which type of certificate is used by an ASA 5505 for client authentication?
Select one:
third-party certificate
purchased certificate
self-signed certificate
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one:
Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?
Select one:
SuperScan
Nmap
L0phtcrack
Zenmap
What type of security test uses simulated attacks to determine possible consequences of a real
threat?
Select one:
penetration testing
network scanning
vulnerability scanning
integrity checking
Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?
Select one:
VPN wizards
Startup Wizard
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
Which executive position is responsible for all IT and computer systems that support enterprise
goals?
Select one:
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
Select one:
Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?
Select one:
L0phtcrack
Nmap
SuperScan
Zenmap
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
service object
network object
Which type of documents offer suggestions on how to do things more securely within an
organization and contain best practices?
Select one:
procedures
standards
guidelines
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
VPN concentrator
stateful firewall
Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)
procedures
best practices
risk assessment
asset inventory
standards
guidelines
Which type of security policy includes defined rules and procedures for creating and maintaining
password security?
Select one:
end-user policy
governing policy
technical policy
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Select one:
remote-access VPN
DSL connection
site-to-site VPN
dial-up connection
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
false
true
Select one:
It is easier to use.
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
What component of a security policy explicitly defines the type of traffic allowed on a network
and what users are allowed and not allowed to do?
Select one:
acceptable use policies
password policies
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
Select one:
System Image/Configuration
Licensing
Advanced
Management Access
True or False?
The effectiveness of an operations security solution can only be tested once a real threat occurs.
Select one:
true
false
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
ROM
TFTP server
flash
RAM
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
stateful firewall
VPN concentrator
Refer to the exhibit. A network administrator is verifying the security configuration of an ASA.
Which command produces the exhibited output?
Select one:
show vlan
Which statement is true about ASA CLI and IOS CLI commands?
Select one:
The ASA CLI does not recognize the write erase command, but the IOS CLI does.
Only the ASA CLI requires the use of Ctrl-C to interrupt show commands.
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
RAM
flash
TFTP server
ROM
Select one:
What component of a security policy explicitly defines the type of traffic allowed on a network
and what users are allowed and not allowed to do?
Select one:
password policies
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Refer to the exhibit. What kind of NAT is configured on the ASA device?
Select one:
dynamic PAT
dynamic NAT
static NAT
Twice NAT
What network testing tool is used for password auditing and recovery?
Select one:
Metasploit
SuperScan
L0phtcrack
Nessus
Refer to the exhibit. Which Device Setup ASDM menu option would be used to configure the
ASA for the current date?
Select one:
Routing
System Time
Startup Wizard
Interfaces
Device Name/Password
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one:
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable
internal workstations to access the Internet. Which configuration command should be used next?
Select one:
True or False?
If the end-user community does not adhere to security policies and procedures, any implemented
network security system can be defeated.
Select one:
false
true
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
VPN concentrator
stateful firewall
Select one:
50
100
255
Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?
Select one:
VPN wizards
Startup Wizard
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a VPN
connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
What are the two methods that can be used to start the Cisco ASDM? (Choose two.)
In the prosecution of an individual, what answers the question of why the individual committed an
illegal act?
Select one:
motive
means
complexity
opportunity
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
service object
network object
Which three detailed documents are used by security staff for an organization to implement the
security policies? (Choose three.)
Select one:
Twice NAT
static NAT
dynamic NAT
dynamic PAT
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA
device. What does the option link3 indicate?
Select one:
Select one:
routing
NAT
management
VPN connectivity
How is success measured in the implementation of a security awareness program throughout a
large organization?
Select one:
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
service object
network object
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
stateful firewall
VPN concentrator
What step must be taken before investigators can determine if data tampering has occurred?
Select one:
Select one:
site-to-site VPN
DSL connection
remote-access VPN
dial-up connection
What type of network security test can detect and report changes made to network systems?
Select one:
integrity checking
Refer to the exhibit. Which three sets of configuration commands were entered on the ASA
5505? (Choose three.)
interface vlan 2
nameif outside
security-level 0
interface e0/0
no shut
exit
Select one:
What type of network security test can detect and report changes made to network systems?
Select one:
network scanning
penetration testing
vulnerability scanning
integrity checking
Which ASDM wizard would allow a network administrator to configure an ASA for NAT/PAT?
Select one:
Startup Wizard
VPN wizards
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an ASA,
why does an initial ping fail, but subsequent pings succeed?
Select one:
By default, which type of certificate is used by an ASA 5505 for client authentication?
Select one:
third-party certificate
purchased certificate
No certificates are used by default. The type must be specified.
self-signed certificate
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
Refer to the exhibit. A network administrator is verifying the security configuration of an ASA.
Which command produces the exhibited output?
Select one:
show vlan
Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?
Select one:
Advanced
Management Access
Licensing
System Image/Configuration
Refer to the exhibit. Which ASDM Device Management item would be used to configure a banner
message on the ASA?
Select one:
Licensing
System Image/Configuration
Advanced
Management Access
Select one:
It is easier to use.
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
True or False?
Select one:
false
true
What two features must match between ASA devices to implement a failover configuration?
(Choose two.)
amount of RAM
software configuration
source IP address
next-hop destination
device model
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one:
Select one:
It is easier to use.
Which network security tool can detect open TCP and UDP ports on most versions of Microsoft
Windows?
Select one:
Nmap
The ASA device can be configured using either the ASDM or the command-line interface.
Refer to the exhibit. A network administrator is configuring AAA implementation on an ASA
device. What does the option link3 indicate?
Select one:
Which type of security policy includes defined rules and procedures for creating and maintaining
password security?
Select one:
governing policy
end-user policy
technical policy
If an AAA authentication server is not available, then the local database is used for
authentication.
What network testing tool is used for password auditing and recovery?
Select one:
L0phtcrack
Nessus
SuperScan
Metasploit
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the purpose
of the crypto map command in interface configuration mode?
Select one:
What two options can be used for the keyword protocol? (Choose two.)
Select one:
remote-access VPN
Select one:
VTY lines
SVI interface
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
What is the most trustworthy security level that can be configured on an ASA device
interface?
Select one:
50
255
100
Refer to the exhibit. Which Device Setup ASDM menu option would be used to configure
the ASA for the current date?
Select one:
Device Name/Password
Interfaces
System Time
Routing
Startup Wizard
Which three security features do ASA models 5505 and 5510 support by default? (Choose
three.)
VPN concentrator
stateful firewall
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered
in the Peer Device Identification window?
Select one:
Select one:
What type of security test uses simulated attacks to determine possible consequences of
a real threat?
Select one:
integrity checking
penetration testing
network scanning
vulnerability scanning
What is the most trustworthy security level that can be configured on an ASA device
interface?
Select one:
255
50
100
Select one:
show vlan
The ASA device can be configured using either the ASDM or the command-line interface.
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
network object
service object
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Which type of security policy includes defined rules and procedures for creating and
maintaining password security?
Select one:
end-user policy
governing policy
technical policy
True or False?
Cisco AnyConnect Secure Mobility Client can be configured to automatically create a
VPN connection that remains up until the user logs out or the session timer expires.
Select one:
true
false
Which ASDM wizard would allow a network administrator to configure an ASA for
NAT/PAT?
Select one:
Startup Wizard
VPN wizards
Select one:
DfltGrpPolicy
Dflt.Grp.Policy
Dflt-Grp-Policy
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the
purpose of the crypto map command in interface configuration mode?
Select one:
Which network security tool can detect open TCP and UDP ports on most versions of
Microsoft Windows?
Select one:
Nmap
SuperScan
Zenmap
L0phtcrack
What are the two methods that can be used to start the Cisco ASDM? (Choose two.)
True or False?
The effectiveness of an operations security solution can only be tested once a real threat
occurs.
Select one:
true
false
Select one:
show vlan
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an
ASA, why does an initial ping fail, but subsequent pings succeed?
Select one:
What type of security test uses simulated attacks to determine possible consequences of
a real threat?
Select one:
vulnerability scanning
integrity checking
penetration testing
network scanning
By default, which type of certificate is used by an ASA 5505 for client authentication?
Select one:
purchased certificate
self-signed certificate
third-party certificate
Which three detailed documents are used by security staff for an organization to
implement the security policies? (Choose three.)
risk assessment
best practices
asset inventory
standards
procedures
guidelines
Select one:
VTY lines
Select one:
True or False?
The effectiveness of an operations security solution can only be tested once a real threat occurs.
Select one:
false
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
true
Which statement is true about ASA CLI and IOS CLI commands?
Select one:
Select one:
integrity checking
Which object or object group is required to implement NAT on an ASA 5505 device?
Select one:
network object
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
RAM
TFTP server
flash
ROM
When testing the tunnel to verify a site-to-site VPN connection between an ISR and an
ASA, why does an initial ping fail, but subsequent pings succeed?
Select one:
Select one:
Zenmap
L0phtcrack
SuperScan
Nmap
What network testing tool is used for password auditing and recovery?
Select one:
Metasploit
L0phtcrack
Nessus
SuperScan
True or False?
If the end-user community does not adhere to security policies and procedures, any
implemented network security system can be defeated.
Select one:
true
false
Refer to the exhibit. A network administrator is configuring AAA implementation on an
ASA device. What does the option link3 indicate?
Select one:
Select one:
In the prosecution of an individual, what answers the question of why the individual
committed an illegal act?
Select one:
complexity
motive
opportunity
means
True or False?
Select one:
true
false
True or False?
The effectiveness of an operations security solution can only be tested once a real threat
occurs.
Select one:
true
false
Which executive position is responsible for all IT and computer systems that support
enterprise goals?
Select one:
When the CLI is used to configure an ISR for a site-to-site VPN connection, what is the
purpose of the crypto map command in interface configuration mode?
Select one:
What two features must match between ASA devices to implement a failover configuration?
(Choose two.)
software configuration
amount of RAM
device model
source IP address
next-hop destination
Where is the Cisco AnyConnect client image found on the Cisco ASA?
Select one:
flash
In the prosecution of an individual, what answers the question of why the individual committed
an illegal act?
Select one:
motive
When ASDM is used to configure the ASA for a site-to-site VPN, which address is entered in the
Peer Device Identification window?
Select one