Professional Documents
Culture Documents
Version : Demo
1. Which two statements about common network attacks are true? (Choose two.)
A. Access attacks can consist of password attacks, trust exploitation, port redirection, and
man-in-the-middle attacks.
B. Access attacks can consist of password attacks, ping sweeps, port scans, and man-in-the-middle
attacks.
C. Access attacks can consist of packet sniffers, ping sweeps, port scans, and man-in-the-middle attacks.
D. Reconnaissance attacks can consist of password attacks, trust exploitation, port redirection and Internet
information queries.
E. Reconnaissance attacks can consist of packet sniffers, port scans, ping sweeps, and Internet information
queries.
F. Reconnaissance attacks can consist of ping sweeps, port scans, man-in-middle attacks and Internet
information queries.
Answer: AE
2. Which two statements about the Cisco AutoSecure feature are true? (Choose two.)
A. All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B. Cisco123 would be a valid password for both the enable password and the enable secret commands.
C. The auto secure command can be used to secure the router login as well as the NTP and SSH
protocols.
D. For an interactive full session of AutoSecure, the auto secure login command should be used.
E. If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure command
is enabled.
Answer: CE
3. Which three statements are correct about MPLS-based VPNs? (Choose three.)
A. Route Targets (RTs) are attributes attached to a VPNv4 BGP route to indicate its VPN membership.
E. A VPN client is not required for users to interact with the network.
Answer: AEF
4. Refer to the exhibit. Which two statements about the AAA configuration are true? (Choose two.)
A. A good security practice is to have the none parameter configured as the final method used to ensure
B. If a TACACS+ server is not available, then a user connecting via the console port would not be able to
C. If a TACACS+ server is not available, then the user Bob could be able to enter privileged mode as long
D. The aaa new-model command forces the router to override every other authentication method previously
F. Two authentication options are prescribed by the displayed aaa authentication command.
Answer: DF
5. Which two Network Time Protocol (NTP) statements are true? (Choose two.)
B. NTP is enabled on all interfaces by default, and all interfaces receive NTP packets.
C. NTP operates on IP networks using User Datagram Protocol (UDP) port 123.
D. The ntp server global configuration is used to configure the NTP master clock to which other peers
synchronize themselves.
E. The show ntp status command displays detailed association information of all NTP peers.
F. Whenever possible, configure NTP version 5 because it automatically provides authentication and
encryption services.
Answer: BC
6. What are the two main features of Cisco IOS Firewall? (Choose two.)
A. TACACS+
B. AAA
E. Authentication Proxy
Answer: DE
7. Refer to the exhibit. On the basis of the partial configuration, which two statements are true? (Choose
two.)
C. A QoS policy has been applied on interfaces Serial 0/0 and FastEthernet 0/1.
D. Interface Fa0/0 should be the inside interface and interface Fa0/1 should be the outside interface.
F. The interface commands ip inspect SDM_LOW in allow CBAC to monitor multiple protocols.
Answer: AF
8. Which two statements describe the functions and operations of IDS and IPS systems? (Choose two.)
C. An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
D. Cisco IDS works inline and stops attacks before they enter the network.
E. Cisco IPS taps the network traffic and responds after an attack.
Answer: BF
9. Refer to the exhibit. What statement is true about the interface S1/0 on router R1?
Answer: D
10. Which two statements about packet sniffers or packet sniffing are true? (Choose two.)
A. To reduce the risk of packet sniffing, traffic rate limiting and RFC 2827 filtering should be used.
C. To reduce the risk of packet sniffing, cryptographic protocols such as Secure Shell Protocol (SSH) and
D. To reduce the risk of packet sniffing, strong authentication, such as one time passwords, should be used.
Answer: CD
11. Which two network attack statements are true? (Choose two.)
A. Access attacks can consist of password attacks, trust exploitation, port redirection, and
man-in-the-middle attacks.
B. Access attacks can consist of UDP and TCP SYN flooding, ICMP echo-request floods, and ICMP
directed broadcasts.
C. DoS attacks can be reduced through the use of access control configuration, encryption, and RFC 2827
filtering.
F. IP spoofing exploits known vulnerabilities in authentication services, FTP services, and web services to
gain entry to web accounts, confidential databases, and other sensitive information.
Answer: AD
12. Which three techniques should be used to secure management protocols? (Choose three.)
C. Implement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the
outside of a firewall.
F. Use TFTP version 3 or above because these versions support a cryptographic authentication mechanism
between peers.
Answer: ABC
13. Refer to the exhibit. Which three tasks can be configured using the IPS Policies wizard via the Cisco
D. the selection of the traffic flow direction that should be inspected by the IPS rules
E. the creation of the signature definition file (SDF) to be used by the router
F. the location of the signature definition file (SDF) to be used by the router
Answer: CDF
14. Which two statements about the AutoSecure feature are true? (Choose two.)
B. If you enable AutoSecure, the minimum length of the login and enable passwords is set to 6 characters.
C. The auto secure full command automatically configures the management and forwarding planes without
D. To enable AutoSecure, the auto secure global configuration command must be used.
E. Once AutoSecure has been configured, the user can launch the SDM Web interface to perform a
security audit.
Answer: AB
15. Refer to the exhibit. Which two statements about the Network Time Protocol (NTP) are true? (Choose
two.)
B. To enable authentication, the ntp authenticate command is required on routers RTA and RTB.
C. To enable NTP, the ntp master command must be configured on routers RTA and RTB.
D. Only NTP time requests are allowed from the host with IP address 10.1.1.1.
E. The preferred time source located at 130.207.244.240 will be used for synchronization regardless of the
Answer: AB
16. Which statement about the aaa authentication enable default group radius enable command is true?
A. If the radius server returns an error, the enable password will be used.
B. If the radius server returns a 'failed' message, the enable password will be used.
C. The command login authentication group will associate the AAA authentication to a specified interface.
Answer: A
17. Refer to the exhibit. All routers participate in the MPLS domain. An IGP propagates the routing
information for network 10.10.10.0/24 from R5 to R1. However, router R3 summarizes the routing
information to 10.10.0.0/16. How will the routes be propagated through the MPLS domain?
A. R3, using LDP, will advertise labels for both networks, and the information will be propagated throughout
B. R3 will label the summary route using a pop label. The route will then be propagated through the rest of
the MPLS domain. R3 will label the 10.10.10.0/24 network and forward to R2 where the network will be
dropped.
C. R3 will label the 10.10.10.0/24 network using a pop label which will be propagated through the rest of the
MPLS domain. R3 will label the summary route and forward to R2 where the network will be dropped.
D. None of the networks will be labeled and propagated through the MPLS domain because aggregation
Answer: B
18. Refer to the exhibit. What Cisco feature generated the configuration?
A. EZ VPN
B. IOS Firewall
C. AutoSecure
D. IOS IPS
E. AAA
F. TACACS+
Answer: C
19. Which three statements about frame-mode MPLS are true? (Choose three.)
A. MPLS has three distinct components consisting of the data plane, the forwarding plane, and the control
plane.
B. The control plane is a simple label-based forwarding engine that is independent of the type of routing
C. The CEF FIB table contains information about outgoing interfaces and their corresponding Layer 2
header.
D. The MPLS data plane takes care of forwarding based on either destination addresses or labels.
E. To exchange labels, the control plane requires protocols such as Tag Distribution Protocol (TDP) or
F. Whenever a router receives a packet that should be CEF-switched, but the destination is not in the FIB,
Answer: DEF
20. Which three statements about IOS Firewall configurations are true? (Choose three.)
A. The IP inspection rule can be applied in the inbound direction on the secured interface.
B. The IP inspection rule can be applied in the outbound direction on the unsecured interface.
C. The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.
D. The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
E. For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for the returning
F. For temporary openings to be created dynamically by Cisco IOS Firewall, the IP inspection rule must be
Answer: ABD