Pass4Test 에서 제공하는 학습가이드에는 IT전문가들이 만들어낸 Cisco 640-554 인증시험의 완벽한 문제와 답들을 대비한 자료가 포함되어있습니다. Pass4Test에서는 IT업계에서의 높은 신뢰감으로 여러분들한테 100%보장을 드립니다. 믿음을 드리기 위하여 Cisco 640-554관련자료의일부분 문제와 답 등 샘플을 무료로 다운받아 체험해 볼수 있게 제공합니다. Cisco 640-554문제와 답을 체험하는 동시에 Pass4Test 제품 선택여부에 대하여 답이 나올 것입니다.Pass4Test 는백프로 여러분들한테 편리함과 통과율을 보장 드립니다. 여러분이 안전하게 Cisco 640-554시험을 패스할 수 있는 곳은 바로 Pass4Test입니다.인증시험을 패스하려면 시험대비 자료 선택은 필수입니다. Pass4Test의 전문가들은 모두 경험도 많고, 그들이 연구해낸 자료는 실제시험의 문제를 많이 적중하고 있습니다.IT업계 종사자라면 누구나 Cisco 640-554시험을 패스하고 싶어하리라고 믿습니다. 많은 분들이 이렇게 좋은 인증시험은 아주 어렵다고 생각합니다. 네 맞습니다.패스할 확율은 아주 낮습니다. 노력하지 않고야 당연히 불가능한 일이 아니겠습니까? Cisco 640-554시험은 기초 지식 그리고 능숙한 전업지식이 필요 합니다. Pass4 Test는 여러분들한테 Cisco 640-554시험을 쉽게 빨리 패스할 수 있도록 도와주는 사이트입니다. Pass4Test의 Cisco 640-554시험관련 자료로 여러분은 짧은 시간내에 간단하게 시험을 패스할수있습니다. 시간도 절약하고 돈도 적게 들이는 이런 제안은 여러분들한테 딱 좋은 해결책이라고봅니다.
NO.1 Which two features are supported by Cisco IronPort Security Gateway? (Choose two.)
A. spam protection
B. outbreak intelligence
C. HTTP and HTTPS scanning
D. email encryption
E. DDoS protection
Answer: A,D
NO.2 When AAA login authentication is configured on Cisco routers, which two authentication methods
should be used as the final method to ensure that the administrator can still log in to the router in case the
external AAA server fails? (Choose two.)
A. group RADIUS
B. group TACACS+
C. local
D. krb5
E. enable
F. if-authenticated
Answer: C,E
NO.3 Refer to the exhibit.
Which statement about this output is true?
A. The user logged into the router with the incorrect username and password.
B. The login failed because there was no default enable password.
C. The login failed because the password entered was incorrect.
D. The user logged in and was given privilege level 15.
Answer: C
NO.4 Which two characteristics represent a blended threat? (Choose two.)
A. man-in-the-middle attack
B. trojan horse attack
C. pharming attack
D. denial of service attack
E. day zero attack
Answer: B,E
NO.5 Refer to the exhibit.
Which traffic is permitted by this ACL?
A. TCP traffic sourced from any host in the 172.26.26.8/29 subnet on any port to host 192.168.1.2 port 80
or 443
B. TCP traffic sourced from host 172.26.26.21 on port 80 or 443 to host 192.168.1.2 on any port
C. any TCP traffic sourced from host 172.26.26.30 destined to host 192.168.1.1
D. any TCP traffic sourced from host 172.26.26.20 to host 192.168.1.2
Answer: C
NO.6 Under which higher-level policy is a VPN security policy categorized?
A. application policy
B. DLP policy
C. remote access policy
D. compliance policy
E. corporate WAN policy
Answer: C
NO.7 Which two characteristics of the TACACS+ protocol are true? (Choose two.)
A. uses UDP ports 1645 or 1812
B. separates AAA functions
C. encrypts the body of every packet
D. offers extensive accounting capabilities
E. is an open RFC standard protocol
Answer: B,C
NO.8 Which option is the correct representation of the IPv6 address
2001:0000:150C:0000:0000:41B1:45A3:041D?
A. 2001::150c::41b1:45a3:041d
B. 2001:0:150c:0::41b1:45a3:04d1
C. 2001:150c::41b1:45a3::41d
D. 2001:0:150c::41b1:45a3:41d
Answer: D
NO.9 Refer to the exhibit.
What does the option secret 5 in the username global configuration mode command indicate about the
user password?
A. It is hashed using SHA.
B. It is encrypted using DH group 5.
C. It is hashed using MD5.
D. It is encrypted using the service password-encryption command.
E. It is hashed using a proprietary Cisco hashing algorithm.
F. It is encrypted using a proprietary Cisco encryption algorithm.
Answer: C
NO.10 Which option is a feature of Cisco ScanSafe technology.?
A. spam protection
B. consistent cloud-based policy
C. DDoS protection
D. RSA Email DLP
Answer: B
NO.11 Which Cisco management tool provides the ability to centrally provision all aspects of device
configuration across the Cisco family of security products?
A. Cisco Configuration Professional
B. Security Device Manager
C. Cisco Security Manager
D. Cisco Secure Management Server
Answer: C
NO.12 Which type of Cisco ASA access list entry can be configured to match multiple entries in a single
statement?
A. nested object-class
B. class-map
C. extended wildcard matching
D. object groups
Answer: D
NO.13 Refer to the exhibit.
Which statement about this partial CLI configuration of an access control list is true?
A. The access list accepts all traffic on the 10.0.0.0 subnets.
B. All traffic from the 10.10.0.0 subnets is denied.
C. Only traffic from 10.10.0.10 is allowed.
D. This configuration is invalid. It should be configured as an extended ACL to permit the associated
wildcard mask.
E. From the 10.10.0.0 subnet, only traffic sourced from 10.10.0.10 is allowed; traffic sourced from the
other 10.0.0.0 subnets also is allowed.
F. The access list permits traffic destined to the 10.10.0.10 host on FastEthernet0/0 from any source.
Answer: E
NO.14 Which three options are common examples of AAA implementation on Cisco routers? (Choose three.)
A. authenticating remote users who are accessing the corporate LAN through IPsec VPN connections
B. authenticating administrator access to the router console port, auxiliary port, and vty ports
C. implementing PKI to authenticate and authorize IPsec VPN peers using digital certificates
D. tracking Cisco NetFlow accounting statistics
E. securing the router by locking down all unused services
F. performing router commands authorization using TACACS+
Answer: A,B,F
NO.15 What does level 5 in this enable secret global configuration mode command indicate?
A. router#enable secret level 5 password
B. The enable secret password is hashed using MD5.
C. The enable secret password is hashed using SHA.
D. The enable secret password is encrypted using Cisco proprietary level 5 encryption.
E. Set the enable secret command to privilege level 5.
F. The enable secret password is for accessing exec privilege level 5.
Answer: E
Cisco 640-554 덤프공부자료
Posted 2013/4/11 2:53:46 | Category: 미분류 | Tag: