Which three options are common examples of AAA implementation on Cisco routers? (Choose three.)

Which three options are common examples of AAA implementation on Cisco routers? (Choose three.) A. authenticating remote users who are accessing the corporate LAN through IPsec VPN connections B. authenticating administrator access to the router console port, auxiliary port, and vty ports C. implementing PKI to authenticate and authorize IPsec...

May 25, 2018 No Comments READ MORE +

What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)

What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)A . Use an SSH connection.B . Use SNMPv3.C . Use out-of-band management.D . Use SNMPv2.E . Use in-band management.View AnswerAnswer: A,B

May 23, 2018 No Comments READ MORE +

Which two authentication types does OSPF support? (Choose two.)

Which two authentication types does OSPF support? (Choose two.)A . plaintextB . MD5C . HMACD . AES 256E . SHA-1F . DESView AnswerAnswer: A,B

May 21, 2018 No Comments READ MORE +

Which tasks is the session management path responsible for? (Choose three.)

Which tasks is the session management path responsible for? (Choose three.)A . Verifying IP checksumsB . Performing route lookupC . Performing session lookupD . Allocating NAT translationsE . Checking TCP sequence numbersF . Checking packets against the access listView AnswerAnswer: B,D,F

May 21, 2018 No Comments READ MORE +

Which statement about a PVLAN isolated port configured on a switch is true?

Which statement about a PVLAN isolated port configured on a switch is true?A . The isolated port can communicate only with the promiscuous port.B . The isolated port can communicate with other isolated ports and the promiscuous port.C . The isolated port can communicate only with community ports.D . The...

May 19, 2018 No Comments READ MORE +

Which label is given to a person who uses existing computer scripts to hack into computers lacking the expertise to write their own?

Which label is given to a person who uses existing computer scripts to hack into computers lacking the expertise to write their own?A . white hat hackerB . hacktivistC . phreakerD . script kiddyView AnswerAnswer: D

May 19, 2018 No Comments READ MORE +

Which statement about this output is true?

Refer to the exhibit. Which statement about this output is true?A . The user logged into the router with the incorrect username and password.B . The login failed because there was no default enable password.C . The login failed because the password entered was incorrect.D . The user logged in...

May 19, 2018 No Comments READ MORE +

Which IOS command is used to define the authentication key for NTP?

Which IOS command is used to define the authentication key for NTP?A . Switch(config)#ntp authentication-key 1 md5 C1sc0B . Switch(config)#ntp trusted-key 1C . Switch(config)#ntp source 192.168.0.1D . Switch(config)#ntp authenticateView AnswerAnswer: A

May 18, 2018 No Comments READ MORE +

Which statement about IOS privilege levels is true?

Which statement about IOS privilege levels is true?A . Each privilege level supports the commands at its own level and all levels below it.B . Each privilege level supports the commands at its own level and all levels above it.C . Privilege-level commands are set explicitly for each user.D ....

May 18, 2018 No Comments READ MORE +

Which two services define cloud networks? (Choose two.)

Which two services define cloud networks? (Choose two.)A . Infrastructure as a ServiceB . Platform as a ServiceC . Security as a ServiceD . Compute as a ServiceE . Tenancy as a ServiceView AnswerAnswer: A,B

May 13, 2018 No Comments READ MORE +