Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1Z0-512" Exam

best dumps for 1Z0-512

 Hi Fellows, 

I would like to know what is the best IZ0-512 currently dump? 

Regards, 

Shaun Ken


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-524 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-524" Exam

Securing Networks with ASA Foundation (SNAF)

 Question 1. 
Tom works as a network administrator. The primary adaptive security appliance in an active/standby failover configuration failed, so the secondary adaptive security appliance was automatically activated. Tom then fixed the problem. Now he would like to restore the primary to active status. 

Which one of the following commands can reactivate the primary adaptive security appliance and restore it to active status while issued on the primary adaptive security appliance? 

A. failover reset 
B. failover primary active 
C. failover active 
D. failover exec standby 

Answer: C 

Question 2. 
For the following commands, which one enables the DHCP server on the DMZ interface of the Cisco ASA with an address pool of 10.0.1.100-10.0.1.108 and a DNS server of 192.168.1.2? 

A. dhcpd address 10.0.1.100-10.0.1.108 DMZ dhcpd dns 192.168.1.2 dhcpd enable DMZ 
B. dhcpd address range 10.0.1.100-10.0.1.108  dhcpd dns server 192.168.1.2 dhcpd enable DMZ 
C. dhcpd range 10.0.1.100-10.0.1.108 DMZ dhcpd dns server 192.168.1.2 dhcpd DMZ 
D. dhcpd address range 10.0.1.100-10.0.1.108 dhcpd dns 192.168.1.2 dhcpd enable 

Answer: A 

Question 3. 
Look at the following exhibit carefully, which one of the four diagrams displays a correctly configured network for a transparent firewall?  
 

A. 1 
B. 2 
C. 3 
D. 4 

Answer: D 

Question 4.
 
What is the effect of the per-user-override option when applied to the access-group command syntax? 

A. The log option in the per-user access list overrides existing interface log options. 
B. It allows for extended authentication on a per-user basis. 
C. Hallows downloadable user access lists to override the access list applied to the interfacE. 
D. It increases security by building upon the existing access list applied to the interfacE. All 
    subsequent users are also subject to the additional access list entries. 

Answer: C 

Question 5. 
John works as a network administrator.  
 

According to the exhibit, the only traffic that John would like to allow through the corporate Cisco ASA adaptive security appliance is inbound HTTP to the DMZ network and all traffic from the inside network to the outside network. John also has configured the Cisco ASA adaptive security appliance, and access through it is now working as expected with one exception: contractors working on the DMZ servers have been surfing the Internet from the DMZ servers, which (unlike other Company XYZ hosts) are using public, routable IP addresses. Neither NAT statements nor access lists have been configured for the DMZ interface. 

What is the reason that the contractors are able to surf the Internet from the DMZ servers?  (Note: The 192.168.X.XIP addresses are used to represent routable public IP addresses even though the 192.168.1.0 network is not actually a public routable network.) 
 

A. An access list on the outside interface permits this traffic. 
B. NAT control is not enabled. 
C. The DMZ servers are using the same global pool of addresses that is being used by the inside 
    hosts. 
D. HTTP inspection is not enabled. 

Answer: B 

Question 6. 
In order to recover the Cisco ASA password, which operation mode should you enter? 

A. configure 
B. unprivileged 
C. privileged 
D. monitor 

Answer: D 

Question 7. 
Which three statements correctly describe protocol inspection on the Cisco ASA adaptive security appliance? (Choose three.) 

A. For the security appliance to inspect packets for signs of malicious application misuse, you 
    must enable advanced (application layer) protocol inspection. 
B. if you want to enable inspection globally for a protocol that is not inspected by default or if you 
    want to globally disable inspection for a protocol, you can edit the default global policy. 
C. The protocol inspection feature of the security appliance securely opens and closes negotiated 
    ports and IP addresses for legitimate client-server connections through the security appliance. 
D. if inspection for a protocol is not enabled, traffic for that protocol may be blocked. 

Answer: B, C, D 

Question 8. 
Observe the following commands, which one verifies that NAT is working normally and displays active NAT translations? 

A. showip nat all 
B. show running-configuration nat 
 
C. showxlate 
D. show nat translation 

Answer: C 

Question 9. 
Multimedia applications transmit requests on TCP, get responses on UDP or TCP, use dynamic ports, and use the same port for source and destination, so they can pose challenges to a firewall. 

Which three items are true about how the Cisco ASA adaptive security appliance handles multimedia applications? (Choose threE.) 

A. it dynamically opens and closes UDP ports for secure multimedia connections, so you do not need to open a large range of ports. 
B. It supports SIP with NAT but not with PAT. 
C. it supports multimedia with or without NAT. 
D. It supports RTSP, H.323, Skinny, and CTIQBE. 

Answer: A, C, D 

Question 10. 
What is the result if the WebVPN url-entry parameter is disabled? 

A. The end user is unable to access pre-defined URLs. 
B. The end user is unable to access any CIFS shares or URLs. 
C. The end user is able to access CIFS shares but not URLs. 
D. The end user is able to access pre-defined URLs. 

Answer: D 


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.