|
ITCertkeys.com is the best side for users i got most important guides and dumps here
|
Question 1. Which Cisco Security product is used to perform a Security Posture Assessment of client workstations? A. Adaptive Security Appliance B. Cisco Security Agent C. Cisco Security Posture Assessment Tool D. Cisco NAS Appliance E. Cisco ACS Answer: D Question 2. Which three policy types can be assigned to a network user role in the Cisco NAC Appliance architecture? (Choose three.) A. Allowed IP Address ranges B. Network Port Scanning Plug-ins C. VPN and roaming policies D. Inactivity period E. Session Duration F. Minimum Password length Answer: B, C, E Question 3. Which two components should be included in a network design document? (Choose two.) A. Complete network blueprint B. Operating Expense C. Risk Analysis D. Configuration for each device E. Detailed part list Answer: A, E Question 4. DRAG DROP You work as a network engineer at ITCertKeys.com. Your boss, Miss. ITCertKeys, is interested in Cisco Security modules. Match the descriptions with the proper module. Use only options that apply. Answer: Question 5. Which statement is true about the Cisco Security MARS Global Controller? A. Rules that are created on a Local Controller can be pushed to the Global Controller B. Most data archiving is done by the Global Controller C. The Global Controller receives detailed incidents information from the Local Controllers and correlates the incidents between multiple Local Controllers D. The Global Controller Centrally Manages of a group of Local Controllers Answer: D Question 6. Which certificates are needed for a device to join a certificate-authenticated network? A. The Certificates of the device and its peer B. The Certificates of the certificate authority, the device and the peer C. The Certificates of the certificate authority and the peer D. The Certificates of the certificate authority and the device Answer: D Question 7. Which three Cisco Security products help to prevent application misuse and abuse? (Choose three.) A. Cisco ASA 5500 Series Adaptive Security Appliances B. Cisco IOS FW and IPS C. Cisco Traffic Anomaly Detector D. Cisco Security Agent E. Cisco Trust Agent F. NAC Appliance (Cisco Clean Access) Answer: A, B, D Question 8. DRAG DROP You work as a network engineer at ITCertKeys.com. Your boss, Miss. ITCertKeys, is interested attack methodologies. Match the descriptions with the proper methodology. Use only options that apply. Answer: Question 9. Which two of these features are integrated security components of the Cisco Adaptive Security Appliance? (Chose two.) A. VRF-aware firewall B. Cisco ASA AIP SSM C. VTI D. Control Plane Policing E. Anti-X F. DMVPN Answer: B, E Question 10. Which of these items is a valid method to verify a network security design? A. Computer simulation B. Network audit C. Sing-off by the operations team D. Pilot or prototype network E. Analysis of earlier attacks Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.