1. Which statement is true about a local SPAN configuration? A port can act as the destination port for all SPAN sessions configured on the switch.A port can be configured to act as a source and destination port for a single SPAN session.Both Layer 2 and Layer 3 switched ports can be configured as source or destination ports for a single SPAN session.Port channel interfaces (EtherChannel) can be configured as source and...
Donate For Me
Sponsor
SWITCH Chapter 6 CCNP 6.0 2012 100% Take Assessment – SWITCH Chapter 6 – CCNP SWITCH: Implementing Cisco IP Switching (Version 6.0) – Answers – 2011 – 2012
Thứ Sáu, 31 tháng 8, 2012
Read more ...
CCNAS Final Exam CCNA Security 1.0 2012 100%-CCNAS Final Exam – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012
Thứ Tư, 1 tháng 8, 2012
1. What will be disabled as a result of the no service password-recovery command ?aaa new-model global configuration command.change to the configuration register.password encryption service.ability to access ROMmon.2. What occurs after RSA keys are generated on a Cisco router to prepare for secure device management?All vty ports are automatically configured for SSH to provide secure management.The general-purpose key size must...
CCNAS Chapter 9 CCNA Security 1.0 2012 100%-CCNAS Chapter 9 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012
Thứ Tư, 1 tháng 8, 2012
1. Which three statements describe ethics in network security? (Choose three.)principles put into action in place of lawsfoundations for current lawsset of moral principles that govern civil behaviorstandard that is higher than the lawset of regulations established by the judiciary systemset of legal standards that specify enforceable actions when the law is broken2. Which component of the security policy lists specific websites,...
CCNAS Chapter 7 CCNA Security 1.0 2012 100%-CCNAS Chapter 7 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012
Thứ Tư, 1 tháng 8, 2012
1. Which symmetrical encryption algorithm is the most difficult to crack?3DESAESDESRSASHA2. What is the basic method used by 3DES to encrypt plaintext?The data is encrypted three times with three different keys.The data is encrypted, decrypted, and encrypted using three different keys.The data is divided into three blocks of equal length for encryption.The data is encrypted using a key length that is three times longer than the...
CCNAS Chapter 8 CCNA Security 1.0 2012 100%-CCNAS Chapter 8 – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012
Thứ Tư, 1 tháng 8, 2012
1. Which IPsec protocol should be selected when confidentiality is required?tunnel modetransport modeauthentication headerencapsulating security payloadgeneric routing encapsulation2. When using ESP tunnel mode, which portion of the packet is not authenticated?ESP headerESP trailernew IP headeroriginal IP header.3. When configuring an IPsec VPN, what is used to define the traffic that is sent through the IPsec tunnel and protected...
Đăng ký:
Bài đăng (Atom)