Selfexamprep 640-554 Exam - Implementing Cisco IOS Network Security

Page 1

Cisco 640-554 640-554 : Implementing Cisco IOS Network Security (IINS v2.0) 10 Q&A

Version 3.0

http://www.selfexamprep.com/640-554.htm


Important Note, Please Read Carefully Other 640-554 products A) Offline Testing engine Use the offline Testing engine product topractice the questions in an exam environment. Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is revised. Free updates are available for 90 days after the purchase. You should check your member zone at 640-554 and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.640-554.com 2.Click on Log in 3.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@640-554.com. You should include the following: Exam number, version, page number, question number, and your login Email. Our experts will answer your mail promptly. Copyright Each iPAD file is a green exe file. if we find out that a particular iPAD Viewer file is being distributed by you, 640-554 reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@640-554.com.

Leading the way in IT testing and certification tools, www.SelfExamPrep.com

-2-


www.640-554.com Q: 1 Which two features are supported by Cisco IronPort Security Gateway? (Choose two.)

A. spam protection B. outbreak intelligence C. HTTP and HTTPS scanning D. email encryption E. DDoS protection

Answer: A, D www.640-554.com Q: 2 What does level 5 in this enable secret global configuration mode command indicate?

A. router#enable secret level 5 password B. The enable secret password is hashed using MD5. C. The enable secret password is hashed using SHA. D. The enable secret password is encrypted using Cisco proprietary level 5 encryption. E. Set the enable secret command to privilege level 5. F. The enable secret password is for accessing exec privilege level 5.

Answer: E

Leading the way in IT testing and certification tools, www.SelfExamPrep.com

-3-


www.640-554.com Q: 3 Which option is the correct representation of the IPv6 address 2001:0000:150C:0000:0000:41B1:45A3:041D?

A. 2001::150c::41b1:45a3:041d B. 2001:0:150c:0::41b1:45a3:04d1 C. 2001:150c::41b1:45a3::41d D. 2001:0:150c::41b1:45a3:41d

Answer: D www.640-554.com Q: 4 Which three options are common examples of AAA implementation on Cisco routers? (Choose three.)

A. authenticating remote users who are accessing the corporate LAN through IPsec VPN connections B. authenticating administrator access to the router console port, auxiliary port, and vty ports C. implementing PKI to authenticate and authorize IPsec VPN peers using digital certificates D. tracking Cisco NetFlow accounting statistics E. securing the router by locking down all unused services F. performing router commands authorization using TACACS+

Answer: A, B, F

Leading the way in IT testing and certification tools, www.SelfExamPrep.com

-4-


www.640-554.com Q: 5 When AAA login authentication is configured on Cisco routers, which two authentication methods should be used as the final method to ensure that the administrator can still log in to the router in case the external AAA server fails? (Choose two.)

A. group RADIUS B. group TACACS+ C. local D. krb5 E. enable F. if-authenticated

Answer: C, E www.640-554.com Q: 6 Which three statements about the IPsec ESP modes of operation are true? (Choose three.)

A. Tunnel mode is used between a host and a security gateway. B. Tunnel mode is used between two security gateways. C. Tunnel mode only encrypts and authenticates the data. D. Transport mode authenticates the IP header. E. Transport mode leaves the original IP header in the clear.

Answer: A, B, E

Leading the way in IT testing and certification tools, www.SelfExamPrep.com

-5-


www.640-554.com Q: 7 When configuring SSL VPN on the Cisco ASA appliance, which configuration step is required only for Cisco AnyConnect full tunnel SSL VPN access and not required for clientless SSL VPN?

A. user authentication B. group policy C. IP address pool D. SSL VPN interface E. connection profile

Answer: C www.640-554.com Q: 8 For what purpose is the Cisco ASA appliance web launch SSL VPN feature used?

A. to enable split tunneling when using clientless SSL VPN access B. to enable users to login to a web portal to download and launch the AnyConnect client C. to enable smart tunnel access for applications that are not web-based D. to optimize the SSL VPN connections using DTLS E. to enable single-sign-on so the SSL VPN users need only log in once

Answer: B www.640-554.com Q: 9 Which statement describes how VPN traffic is encrypted to provide confidentiality when using asymmetric encryption?

Leading the way in IT testing and certification tools, www.SelfExamPrep.com

-6-


A. The sender encrypts the data using the sender's private key, and the receiver decrypts the data using the sender's public key. B. The sender encrypts the data using the sender's public key, and the receiver decrypts the data using the sender's private key. C. The sender encrypts the data using the sender's public key, and the receiver decrypts the data using the receiver's public key. D. The sender encrypts the data using the receiver's private key, and the receiver decrypts the data using the receiver's public key. E. The sender encrypts the data using the receiver's public key, and the receiver decrypts the data using the receiver's private key. F. The sender encrypts the data using the receiver's private key, and the receiver decrypts the data using the sender's public key.

Answer: E www.640-554.com Q: 10 Which four types of VPN are supported using Cisco ISRs and Cisco ASA appliances? (Choose four.)

A. SSL clientless remote-access VPNs B. SSL full-tunnel client remote-access VPNs C. SSL site-to-site VPNs D. IPsec site-to-site VPNs E. IPsec client remote-access VPNs F. IPsec clientless remote-access VPNs

Leading the way in IT testing and certification tools, www.SelfExamPrep.com

-7-


Answer: A, B, D, E

Leading the way in IT testing and certification tools, www.SelfExamPrep.com

-8-


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.