IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CCNP Security 642-618 시험덤프공부

Pass4Test의 CCNP Security 642-618 학습가이드는 시험의 예상문제부터 전면적이로 만들어진 아주 퍼펙트한 시험자료입니다. Pass4Test 의 서비스는  CCNP Security 642-618구매 후 최신버전이 업데이트 시 최신문제와 답을 모두 무료로 제공합니다. Pass4Test에서는 응시자분들의 고민을 덜어드릴 수 있습니다. 빨리 성공하고 빨리 CCNP Security 642-618 인증시험을 패스하고 싶으시다면  Pass4Test를 찾아주세요.Pass4Test제품은 여러분의 아주 좋은 학습가이드가 될것입니다. Pass4Test로 여러분은 소유하고 싶은 인증서를 빠른 시일내에 얻게 될것입니다.IT업계 종사자라면 누구나 CCNP Security 642-618시험을 패스하고 싶어하 리라고 믿습니다. 많은 분들이 이렇게 좋은 인증시험은 아주 어렵다고 생각합니다. 네 맞습니다. 패스할 확율은 아주 낮습니다. 노력하지 않고야 당연히 불가능한 일이 아니겠 습니까?CCNP Security 642-618시험은 기초 지식 그리고 능숙한 전업지식이 필요 합니다. Pass4Test는 여러분들한테 CCNP Security 642-618시험을 쉽게 빨리 패스할 수 있도록 도와주는 사이트입니다.Pass4 Test 의  CCNP Security 642-618시험관련 자료로 여러분은 짧은 시간내에 간단하게 시험을 패스할수 있습니다. 시간도 절약하고 돈도 적게 들이는 이런 제안은 여러분들한테 딱 좋은 해결책이라고 봅니다.

 

 

NO.1 When will a Cisco ASA that is operating in transparent firewall mode perform a routing table lookup
instead of a MAC address table lookup to determine the outgoing interface of a packet?
A. if multiple context mode is configured
B. if the destination MAC address is unknown
C. if the destination is more than a hop away from the Cisco ASA
D. if NAT is configured
E. if dynamic ARP inspection is configured
Answer: D

NO.2 Refer to the exhibit.
Which command enables the stateful failover option?
A. failover link MYFAILOVER GigabitEthernet0/2
B. failover lan interface MYFAILOVER GigabitEthernet0/2
C. failover interface ip MYFAILOVER 172.16.5.1 255.255.255.0 standby 172.16.5.10
D. preempt
E. failover group 1 primary
F. failover lan unit primary
Answer: A

NO.3 By default, which traffic can pass through a Cisco ASA that is operating in transparent mode without
explicitly allowing it using an ACL.?
A. ARP
B. BPDU
C. CDP
D. OSPF multicasts
E. DHCP
Answer: A

NO.4 In one custom dynamic application, the inside client connects to an outside server using TCP port
4444 and negotiates return client traffic in the port range of 5000 to 5500. The server then starts
streaming UDP data to the client on the negotiated port in the specified range. Which Cisco ASA feature
or command supports this custom dynamic application?
A. TCP normalizer
B. TCP intercept
C. ip verify command
D. established command
E. tcp-map and tcp-options commands
F. set connection advanced-options command
Answer: D

NO.5 Refer to the exhibit.
Which statement about the policy map named test is true?
A. Only HTTP inspection will be applied to the TCP port 21 traffic.
B. Only FTP inspection will be applied to the TCP port 21 traffic.
C. both HTTP and FTP inspections will be applied to the TCP port 21 traffic.
D. No inspection will be applied to the TCP port 21 traffic, because the http class map configuration
conflicts with the ftp class map.
E. All FTP traffic will be denied, because the FTP traffic will fail the HTTP inspection.
Answer: B

NO.6 Refer to the exhibit.
What can be determined about the connection status?
A. The output is showing normal activity to the inside 10.1.1.50 web server.
B. Many HTTP connections to the 10.1.1.50 web server have successfully completed the three-way TCP
handshake.
C. Many embryonic connections are made from random sources to the 10.1.1.50 web server.
D. The 10.1.1.50 host is triggering SYN flood attacks against random hosts on the outside.
E. The 10.1.1.50 web server is terminating all the incoming HTTP connections.
Answer: C

NO.7 When enabling a Cisco ASA to send syslog messages to a syslog server, which syslog level will
produce the most messages?
A. notifications
B. informational
C. alerts
D. emergencies
E. errors
F. debugging
Answer: F

NO.8 Refer to the exhibit.
What does the * next to the CTX security context indicate?
A. The CTX context is the active context on the Cisco ASA.
B. The CTX context is the standby context on the Cisco ASA.
C. The CTX context contains the system configurations.
D. The CTX context has the admin role.
Answer: D

NO.9 Refer to the exhibit.
What is a reasonable conclusion?
A. The maximum number of TCP connections that the 10.1.1.99 host can establish will be 146608.
B. All the connections from the 10.1.1.99 have completed the TCP three-way handshake.
C. The 10.1.1.99 hosts are generating a vast number of outgoing connections, probably due to a virus.
D. The 10.1.1.99 host on the inside is under a SYN flood attack.
E. The 10.1.1.99 host operations on the inside look normal.
Answer: C

NO.10 Which Cisco ASA feature is implemented by the ip verify reverse-path interface interface_name
command?
A. uRPF
B. TCP intercept
C. botnet traffic filter
D. scanning threat detection
E. IPS (IP audit)
Answer: A

NO.11 Refer to the exhibit.
Which Cisco ASA feature can be configured using this Cisco ASDM screen?
A. Cisco ASA command authorization using TACACS+
B. AAA accounting to track serial, ssh, and telnet connections to the Cisco ASA
C. Exec Shell access authorization using AAA
D. cut-thru proxy
E. AAA authentication policy for Cisco ASDM access
Answer: D

NO.12 Which option is not supported when the Cisco ASA is operating in transparent mode and also is using
multiple security contexts?
A. NAT
B. shared interface
C. security context resource management
D. Layer 7 inspections
E. failover
Answer: B

NO.13 Which statement about the default ACL logging behavior of the Cisco ASA is true?
A. The Cisco ASA generates system message 106023 for each denied packet when a deny ACE is
configured.
B. The Cisco ASA generates system message 106023 for each packet that matched an ACE.
C. The Cisco ASA generates system message 106100 only for the first packet that matched an ACE.
D. The Cisco ASA generates system message 106100 for each packet that matched an ACE.
E. No ACL logging is enabled by default.
Answer: A

NO.14 Refer to the exhibit.
Which statement about the MPF configuration is true?
A. Any non-RFC complaint FTP traffic will go through additional deep FTP packet inspections.
B. FTP traffic must conform to the FTP RFC, and the FTP connection will be dropped if the PUT command
is used.
C. Deep FTP packet inspections will be performed on all TCP inbound and outbound traffic on the outside
interface.
D. The ftp-pm policy-map type should be type inspect.
E. Due to a configuration error, all FTP connections through the outside interface will not be permitted.
Answer: B

NO.15 Which flag shown in the output of the show conn command is used to indicate that an initial SYN
packet is from the outside (lower security-level interface)?
A. B
B. D
C. b
D. A
E. a
F. i
G. I
H. O
Answer: A

NO.16 By default, how does the Cisco ASA authenticate itself to the Cisco ASDM users?
A. The administrator validates the Cisco ASA by examining the factory built-in identity certificate
thumbprint of the Cisco ASA.
B. The Cisco ASA automatically creates and uses a persistent self-signed X.509 certificate to authenticate
itself to the administrator.
C. The Cisco ASA automatically creates a self-signed X.509 certificate on each reboot to authenticate
itself to the administrator.
D. The Cisco ASA and the administrator use a mutual password to authenticate each other.
E. The Cisco ASA authenticates itself to the administrator using a one-time password.
Answer: C

NO.17 In which type of environment is the Cisco ASA MPF set connection advanced-options tcp-statebypass
option the most useful?
A. SIP proxy
B. WCCP
C. BGP peering through the Cisco ASA
D. asymmetric traffic flow
E. transparent firewall
Answer: D

NO.18 On the Cisco ASA, tcp-map can be applied to a traffic class using which MPF CLI configuration
command?
A. inspect
B. sysopt connection
C. tcp-options
D. parameters
E. set connection advanced-options
Answer: E

NO.19 Which Cisco ASA feature enables the ASA to do these two things? 1) Act as a proxy for the server and
generate a SYN-ACK response to the client SYN request. 2) When the Cisco ASA receives an ACK back
from the client, the Cisco ASA authenticates the client and allows the connection to the server.
A. TCP normalizer
B. TCP state bypass
C. TCP intercept
D. basic threat detection
E. advanced threat detection
F. botnet traffic filter
Answer: C

NO.20 What mechanism is used on the Cisco ASA to map IP addresses to domain names that are contained in
the botnet traffic filter dynamic database or local blacklist?
A. HTTP inspection
B. DNS inspection and snooping
C. WebACL
D. dynamic botnet database fetches (updates)
E. static blacklist
F. static whitelist
Answer: B
Posted 2013/4/11 3:01:30  |  Category: 미분류  |  Tag: