IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0) 덤프

Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0) 시험을 패스하여 자격증을 취득한다면 여러분의 미래에 많은 도움이 될 것입니다. Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0)   시험 자격증은 it업계에서도 아주 인지도가 높고 또한 알아주는 시험이며 자격증 하나로도 취직은 문제없다고 볼만큼 가치가 있는 자격증이죠. Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0)  시험은 여러분이 it지식 테스트 시험입니다.Pass4Test는  Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0)   시험에 대하여 응시가이드를해줄 수 있는 사이트입니다. Pass4Test는 여러분의 전업 지식을 업그레이드 시켜줄 수 있고 또한 한번에  Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0)   시험을 패스하도록 도와주는 사이트입니다. Pass4Test에서 제공하는자료들은 모두 it업계 전문가들이 자신의 지식과 끊임없는 경험등으로 만들어낸 퍼펙트한 자료들입니다. 품질과 정확도가  모두보장되는 문제집입니다. Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0)  시험은 여러분이 it지식을 한층 업할수 있는 시험이며 우리 또한 일년무료 업데이트 서비스를 제공합니다.Pass4Test를 선택함으로  여러분은 Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE) v1.0)  시험을 한방에 패스할 수 있습니다.만약 시험에서 실패하시면  Pass4Test에서는 덤프비용 전액환불을 약속합니다.

 

 

NO.1 When Cisco IOS IPS is configured to use SDEE for event notification, how are events managed?
A. They are stored in the router's event store and will allow authenticated remote systems to pull events
from the event store.
B. All events are immediately sent to the remote SDEE server.
C. Events are sent via syslog over a secure SSUTLS communications channel.
D. When the event store reaches its maximum configured number of event notifications, the stored events
are sent via SDEE to a remote authenticated server and a new event store is created.
Answer: A

NO.2 You are running Cisco IOS IPS software on your edge router. A new threat has become an issue. The
Cisco IOS IPS software has a signature that can address the new threat, but you previously retired the
signature. You decide to unretire that signature to regain the desired protection level. How should you act
on your decision?
A. Retired signatures are not present in the routers memory. You will need to download a new signature
package to regain the retired signature.
B. You should re-enable the signature and start inspecting traffic for signs of the new threat.
C. Unretiring a signature will cause the router to recompile the signature database, which can temporarily
affect performance.
D. You cannot unretire a signature. To avoid a disruption in traffic flow, it's best to create a custom
signature until you can download a new signature package and reload the router.
Answer: C

NO.3 You are troubleshooting reported connectivity issues from remote users who are accessing corporate
headquarters via an IPsec VPN connection. What should be your first step in troubleshooting these
issues?
A. issue a show crypto isakmp policy command to verify matching policies of the tunnel endpoints
B. ping the tunnel endpoint
C. run a traceroute to verify the tunnel path
D. debug the connection process and look for any error messages in tunnel establishment
Answer: B

NO.4 When configuring a zone-based policy firewall, what will be the resulting action if you do not specify any
zone pairs for a possible pair of zones?
A. All sessions will pass through the zone without being inspected.
B. All sessions will be denied between these two zones by default.
C. All sessions will have to pass through the router "self zone" for inspection before being allowed to pass
to the destination zone.
D. This configuration statelessly allows packets to be delivered to the destination zone.
Answer: B

NO.5 Which Cisco IOS IPS feature allows to you remove one or more actions from all active signatures
based on the attacker and/or target address criteria, as well as the event risk rating criteria?
A. signature event action filters
B. signature event action overrides
C. signature attack severity rating
D. signature event risk rating
Answer: A

NO.6 Refer to the exhibit.
What can be determined about the IPS category configuration shown?
A. All categories are disabled.
B. All categories are retired.
C. After all other categories were disabled, a custom category named "os ios" was created
D. Only attacks on the Cisco IOS system result in preventative actions.
Answer: D

NO.7 Which of these allows you to add event actions globally based on the risk rating of each event, without
having to configure each signature individually?
A. event action summarization
B. event action filter
C. event action override
D. signature event action processor
Answer: C

NO.8 DRAG DROP
Answer:

NO.9 Refer to the exhibit.
What can be determined from the output of this show command?
A. The IPsec connection is in an idle state.
B. The IKE association is in the process of being set up.
C. The IKE status is authenticated.
D. The ISAKMP state is waiting for quick mode status to authenticate before IPsec parameters are
passed between peers
E. IKE Quick Mode is in the idle state, indicating a problem with IKE phase 1.
Answer: C

NO.10 Which two of these are benefits of implementing a zone-based policy firewall in transparent mode?
(Choose two.)
A. Less firewall management is needed.
B. It can be easily introduced into an existing network.
C. IP readdressing is unnecessary.
D. It adds the ability to statefully inspect non-IP traffic.
E. It has less impact on data flows.
Answer: B,C

NO.11 Refer to the exhibit.
Which two Cisco IOS WebVPN features are enabled with the partial configuration shown? (Choose two.)
A. The end-user Cisco AnyConnect VPN software will remain installed on the end system.
B. If the Cisco AnyConnect VPN software fails to install on the end-user PC, the end user cannot use
other modes.
C. Client based full tunnel access has been enabled.
D. Traffic destined to the 10.0.0.0/8 network will not be tunneled and will be allowed access via a split
tunnel.
E. Clients will be assigned IP addresses in the 10.10.0.0/16 range.
Answer: A,C

NO.12 Which of these is correct regarding the configuration of virtual-access interfaces?
A. They cannot be saved to the startup configuration.
B. You must use static routes inside the tunnels.
C. DVTI interfaces should be assigned a unique IP address range.
D. The Virtual-Access 1 interface must be enabled in an up/up state administratively
Answer: A

NO.13 DRAG DROP
Answer:

NO.14 Which of these is a configurable Cisco IOS feature that triggers notifications if an attack attempts to
exhaust critical router resources and if preventative controls have been bypassed or are not working
correctly?
A. Control Plane Protection
B. Management Plane Protection
C. CPU and memory thresholding
D. SNMPv3
Answer: C

NO.15 Which two of these will match a regular expression with the following configuration parameters?
[a-zA-Z][0-9][a-z] (Choose two.)
A. Q3h
B. B4Mn
C. aaB132AA
D. c7lm
E. BBpjnrIT
Answer: A,D

NO.16 Refer to the exhibit.
The INSIDE zone has been configured and assigned to two separate router interfaces. All other zones
and interfaces have been properly configured. Given the configuration example shown, what can be
determined?
A. Hosts in the INSIDE zone, with addresses in the 10.10.10.0/24 network, can access any host in the
10.10.10.0/24 network using the SSH protocol.
B. If a host in the INSIDE zone attempts to communicate via SSH with another host on a different
interface within the INSIDE zone, communications must pass through the router self zone using the
INTRAZONE policy.
C. This is an illegal configuration. You cannot have the same source and destination zones.
D. This policy configuration is not needed, traffic within the same zone is allowed to pass by default.
Answer: D

NO.17 When using Cisco Easy VPN, what are the three options for entering an XAUTH username and
password for establishing a VPN connection from the Cisco Easy VPN remote router? (Choose three.)
A. using an external AAA server B. entering the information via the router crypto ipsec client ezvpn
connect CLI command in privileged EXEC mode
C. using the router local user database
D. entering the information from the PC via a browser
E. storing the XAUTH credentials in the router configuration file
Answer: B,D,E

NO.18 Which action does the command private-vlan association 100,200 take?
A. configures VLANs 100 and 200 and associates them as a community
B. associates VLANs 100 and 200 with the primary VLAN
C. creates two private VLANs with the designation of VLAN 100 and VLAN 200
D. assigns VLANs 100 and 200 as an association of private VLANs
Answer: B

NO.19 Refer to the exhibit.
Given the partial output of the debug command, what can be determined?
A. There is no ID payload in the packet, as indicated by the message ID = 0.
B. The peer has not matched any offered profiles.
C. This is an IKE quick mode negotiation.
D. This is normal output of a successful Phase 1 IKE exchange.
Answer: B

NO.20 Which statement best describes inside policy based NAT?
A. Policy NAT rules are those that determine which addresses need to be translated per the enterprise
security policy
B. Policy NAT consists of policy rules based on outside sources attempting to communicate with inside
endpoints.
C. These rules use source addresses as the decision for translation policies.
D. These rules are sensitive to all communicating endpoints.
Answer: A

 
Posted 2013/1/21 6:39:12  |  Category: 미분류  |  Tag: