|
Question 1. Which two of these Cisco Catalyst security features offer the best ways to prevent ARP cache poisoning? (Choose two.) A. Dynamic ARP Inspection B. port security C. MAC address notification D. DHCP snooping E. PortFast F. 802.1x authentication Answer: A, D Question 2. Which one of the following is not a valid RADIUS packet type? A. access-reject B. access-response C. access-challenge D. access-reply E. access-accept Answer: B Question 3. Which two of these statements about SMTP and ESMTP are the most correct? (Choose two.) A. Open mail relays are often used for spamming. B. ESMTP does not provide more security features than SMTP. C. SMTP provides authenticated e-mail sending. D. Worms often spread via SMTP. Answer: A, D Question 4. Refer to the exhibit. Which three of the following statements are correct? (Choose three.) A. The exhibit shows an example of a NAC Framework network. B. The exhibit shows an example of a NAC Appliance network. C. The network utilizes in-band admission control. D. The network utilizes out-of-band admission control. E. Cisco NAC Appliance Agent is used to verify end-user PC compliance with the security policy F. Cisco Trust Agent is used to verify end-user PC compliance with the security policy. Answer: B, C, E Question 5. Referring to the partial debug output shown in the exhibit, which of these values is contained inside the brackets [4] in line 1? A. RADIUS identifier field value B. RADIUSattribute type value C. RADIUS VSA number D. RADIUS VSA length E. vendor ID Answer: B Question 6. What is the net effect of using ICMP type 4 messages to attack RFC 1122-compliant hosts? A. Hosts will perform a soft TCP reset and restart the connection. B. Hosts will perform a hard TCP reset and tear down the connection. C. Hosts will reduce the rate at which they inject traffic into the network. D. Hosts will redirect packets to the IP address indicated in the ICMP type 4message. E. Hosts will retransmit the last frame sent prior to receiving the ICMP type 4 message. Answer: C Question 7. Refer to the exhibit. Switch SW2 has just been added to Fa0/23 on SW1. After a few seconds, interface Fa0/23 on SW1 is placed in the error-disabled state. SW2 is removed from port 0/23 and inserted into SWI port Fa0/22 with the same result. What is the most likely cause of this problem? A. The spanning-tree PortFast feature has been configured on SW1. B. BPDU filtering has been enabled either globally or on the interfaces of SW1. C. The BPDU guard feature has been enabled on the Fast Ethernet interfaces of SW1. D. The Fast Ethernet interfaces of SW1 are unable to autonegotiate speed and duplex with SW2. E. PAgP is unable to correctly negotiate VLAN trunk characteristics on the link between SWI and SW2. Answer: C Question 8. ASDM on the Cisco ASA adaptive security appliance platform is executed as which of the following? A. an ActiveX application or a JavaScript application B. a JavaScript application and a PHP application C. a fully compiled .Net Framework application D. a fully operational Visual Basic application E. a Java applet or a standalone application using the Java Runtime Environment Answer: D Question 9. After the client opens the command channel (port 21) to the FTP server and requests passive mode, what will be the next step? A. The FTP server sends back an ACK to the client. B. The FTP server allocates a port to use for the data channel and transmits that port number to the client. C. The FTP server opens the data channel to the client using the port number indicated by the client. D. The FTP client opens the data channel to the FTP server on port 20. E. The FTP client opens the data channel to the FTP server on port 21. Answer: B Question 10. In ISO 27001 ISMS, which three of these certification process phases are required to collect information for ISO 27001? (Choose three.) A. discover B. certification audit C. post-audit D. observation E. pre-audit F. major compliance Answer: B, C, E
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.