|
Pls send a latest dump to ec_fdshsf@hotmail.com
|
Question 1. The NAS is configured to autogenerate an IP address pool of 30 subnets with a netmask of /30, beginning at address 192.166.10.0. Which IP address is leased to the end-user host on the second subnet? A. 192.166.10.4 B. 192.166.10.5 C. 192.166.10.6 D. 192.166.10.7 Answer: C Question 2. Which derault administrator group has delete permissions? A. admin B. help-desk C. add-edit D. full-control Answer: D Question 3. What is the result when the condition statement in a Cisco NAA check for required software evaluates to false on a client machine? A. The required software is automatically downloaded to the user device. B. The required software is made available after the user is quarantined. C. The user is put in the unauthenticated role and the software is considered missing. D. The user is placed in the temporary role and the software is made available. Answer: B Question 4. Which three components comprise a Cisco NAC Appliance solution? (Choose three.) A. a NAC-enabled Cisco router B. a Linux server for in-band or out-of-band network admission control C. a Linux server for centralized management of network admission servers D. a Cisco router to provide VPN services E. a read-only client operating on an endpoint device F. a NAC-enabled Cisco switch Answer: B, C, E Question 5. Drag the default username from the left to the correct description on the right. Answer: Question 6. Drag each feature of a Cisco NAC Appliance solution from the left to its correct benefit on the right. Answer: Question 7. When configuring the Cisco NAM to implement Cisco NAA requirement checking on client machines, what is the next step after configuring checks and rules? A. retrieve updates B. require the use of the Cisco NAA C. configure session timeout and traffic policies D. map rules to requirement E. configure requirements Answer: E Question 8. When logging in to a Cisco NAC Appliance solution, an end user is prompted for a username, password, and provider. What should be entered in the Provider drop-down field shown in the exhibit? A. the authenticating NAS B. the authorizing NAM C. the name of the ISP D. the external authenticating server Answer: D Question 9. What are the two types of traffic policies that apply to user roles? (Choose two.) A. IP-based B. peer-based C. host-based D. manager-based E. server-based F. VLAN-based Answer: A, C Question 10. After you implement a network scan and view the report, you notice that a plug-in did not access any of its dependent plug-ins. What did you forget to do? A. enable the Dependent Plug-in check box on the General Tab form B. configure dependent plug-in support when you mapped the Nessus scan check to the Nessus plug-in rule C. install dependent plug-ins when you updated the Cisco NAC Appliance plug-in library D. load the dependent plug-ins for that plug-in in the Plug-in Updates form Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.