IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Cisco CCNP Security 642-648 시험덤프자료

Pass4Test는 여러분들한테 최고의    CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 문제와 답을 제공함으로 높은 적중율을 자랑합니다, 여러분은   CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 인증시험의 패스로 IT업계와  직장에서 한층 업그레이드 되실수 있습니다. 여러분의 미래는 더욱더 아름다울 것입니다.  CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 시험의 인기는 날마다 더해갑니다. CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 시험에 응시하는 분들도 날마다 더 많아지고 있습니다.  CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 인증시험 준비중인 여러분은 어떤 자료를 준비하였나요?Pass4Test는 전문적인 IT인증시험덤프를 제공하는 사이트입니다. CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 인증시험을 패스하려면 Pass4Test을 선택하시면 아주 현명한 선택입니다. Pass4Test에서는  CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 관련 자료도 제공함으로 여러분처럼 IT 인증시험에 관심이 많은 분들한테 아주 유용한 자료이자 학습가이드입니다. Pass4Test는 여러분이 원하는 최신 최고버전의  CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 문제와 답을 제공합니다.  CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )  인증덤프는 IT업계전문가들이 끊임없는 노력과 지금까지의 경험으로 연구하여 만들어낸 제일 정확한 시험문제와 답들로 만들어졌습니다. Pass4Test의 문제집으로 여러분은 충분히 안전이 시험을 패스하실 수 있습니다. 우리 Pass4Test 의 문제집들은 모두 100%합격율을 자랑하며 Pass4Test의 제품을 구매하였다면  CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 관련 시험패스와 자격증 취득은 근심하지 않으셔도 됩니다. 여러분은 IT업계에서 또 한층 업그레이드 될것입니다.

 

 

NO.1 Cisco Secure Desktop seeks to minimize the risks that are posed by the use of remote devices in
establishing a Cisco clientless SSL VPN or Cisco AnyConnect VPN Client session. Which two statements
concerning the Cisco Secure Desktop Host Scan feature are correct? (Choose two.)
A. It is performed before a user establishes a connection to the Cisco ASA.
B. It is performed after a user establishes a connection to the Cisco ASA but before logging in.
C. It is performed after a user logs in but before a group profile is applied.
D. It is supported on endpoints that run a Windows operating system only.
E. It is supported on endpoints that run Windows and MAC operating systems only.
F. It is supported on endpoints that run Windows, MAC, and Linux operating systems.
Answer: B,F

NO.2 Which three options are characteristics of WebType ACLs? (Choose three.)
A. They are assigned per-connection profile.
B. They are assigned per-user or per-group policy.
C. They can be defined in the Cisco AnyConnect Profile Editor.
D. They support URL pattern matching.
E. They support implicit deny all at the end of the ACL.
F. They support standard and extended WebType ACLs.
Answer: B,D,E

NO.3 When initiating a new SSL or TLS session, the client receives the server SSL certificate and validates it.
After validating the server certificate, what does the client use the certificate for?
A. The client and server use the server public key to encrypt the SSL session data.
B. The server creates a separate session key and sends it to the client. The client decrypts the session
key by using the server public key.
C. The client and server switch to a DH key exchange to establish a session key.
D. The client generates a random session key, encrypts it with the server public key, and then sends it to
the server.
Answer: D

NO.4 Refer to the exhibit. In the CLI snippet that is shown, what is the function of the deny option in the
access list?
A. When set in conjunction with outbound connection-type bidirectional, its function is to prevent the
specified traffic from being protected by the crypto map entry.
B. When set in conjunction with connection-type originate-only, its function is to instruct the Cisco ASA to
deny specific inbound traffic if it is not encrypted.
C. When set in conjunction with outbound connection-type answer-only, its function is to instruct the Cisco
ASA to deny specific outbound traffic if it is not encrypted.
D. When set in conjunction with connection-type originate-only, its function is to cause all IP traffic that
matches the specified conditions to be protected by the crypto map.
Answer: A

NO.5 In which three ways can a Cisco ASA security appliance obtain a certificate revocation list? (Choose
three.)
A. FTP
B. SCEP
C. TFTP
D. HTTP
E. LDAP
F. SCP
Answer: B,D,E

NO.6 When deploying clientless SSL VPN advanced application access, the administrator needs to collect
information about the end-user system. Which three input parameters of an end-user system are
important for the administrator to identify? (Choose three.)
A. types of applications and application protocols that are supported
B. types of encryption that are supported on the end-user system
C. the local privilege level of the remote user
D. types of wireless security that are applied to the end-user tunnel interface
E. types of operating systems that are supported on the end-user system
F. type of antivirus software that is supported on the end-user system
Answer: A,C,E

NO.7 Refer to the exhibit.The ABC Corporation is changing remote-user authentication from pre-shared keys
to certificate-based authentication. For most employee authentication, its group membership (the
employees) governs corporate access. Certain management personnel need access to more confidential
servers. Access is based on the group and name, such as finance and level_2. When it is time to pilot the
new authentication policy, a finance manager is able to access the department-assigned servers but
cannot access the restricted servers.
As the network engineer, where would you look for the problem?
A. Check the validity of the identity and root certificate on the PC of the finance manager.
B. Change the Management Certificate to Connection Profile Maps > Rule Priority to a number that is
greater than 10.
C. Check if the Management Certificate to Connection Profile Maps > Rules is configured correctly.
D. Check if the Certificate to Connection Profile Maps > Policy is set correctly.
Answer: D

NO.8 Which three statements about clientless SSL VPN are true? (Choose three.)
A. Users are not tied to a particular PC or workstation.
B. Users have full application access to internal corporate resources.
C. Minimal IT support is required.
D. Cisco AnyConnect SSL VPN software is automatically downloaded to the remote user at the start of
the clientless session.
E. For security reasons, browser cookies are disabled for clientless SSL VPN sessions.
F. Clientless SSL VPN requires an SSL-enabled web browser.
Answer: A,C,F

NO.9 ABC Corporation has hired a temporary worker to help out with a new project. The network
administrator gives you the task of restricting the internal clientless SSL VPN network access of the
temporary worker to one server with the IP address of 172.26.26.50 via HTTP.
Which two actions should you take to complete the assignment.? (Choose two.)
A. Configure access-list temp_acl webtype permit url http://172.26.26.50.
B. Configure access-list temp_acl_stand_ACL standard permit host 172.26.26.50.
C. Configure access-list temp_acl_extended extended permit http any host 172.26.26.50.
D. Apply the access list to the temporary worker Group Policy.
E. Apply the access list to the temporary worker Connection Profile.
F. Apply the access list to the outside interface in the inbound direction.
Answer: A,D

NO.10 When establishing a Cisco AnyConnect SSL VPN tunnel, a system administrator wants to restrict
remote home office users to either print to their local printer or send the remaining traffic down the Cisco
AnyConnect SSL VPN tunnel (with restricted Internet access).
Choose both a tunnel policy option and an ACL type to accomplish this design goal. (Choose two.)
A. tunnel all networks
B. tunnel network list below
C. exclude network list from the tunnel
D. standard ACL
E. web ACL
F. extended ACL
Answer: C,D

NO.11 Which statement about CRL configuration is correct?
A. CRL checking is enabled by default.
B. The Cisco ASA relies on HTTPS access to procure the CRL list.
C. The Cisco ASA relies on LDAP access to procure the CRL list.
D. The Cisco Secure ACS can be configured as the CRL server.
Answer: C

NO.12 Which two options are correct regarding IKE and IPv6 VPN support on the Cisco ASA using version
8.4? (Choose two.)
A. The Cisco ASA supports full IKEv2 IPv6 for site-to-site VPNs only.
B. The Cisco ASA supports full IKEv2 IPv6 for remote-access VPNs.
C. The Cisco ASA supports IKEv1 and IKEv2 configuration on the same crypto map.
D. The Cisco ASA supports negotiation of authentication type using IKEv2 with IPv6.
E. The Cisco ASA supports all types of VPN configurations when using IPv6
Answer: A,C

NO.13 Refer to the exhibit.
You are configuring a laptop with the Cisco VPN Client, which uses digital certificates for authentication.
Which protocol does the Cisco VPN Client use to retrieve the digital certificate from the CA server?
A. FTP
B. LDAP
C. HTTPS
D. SCEP
E. OCSP
Answer: D

NO.14 Refer to the exhibit.
While configuring a site-to-site VPN tunnel, a new NOC engineer encounters the Reverse Route Injection
parameter.
Assuming that static routes are redistributed by the Cisco ASA to the IGP, what effect does enabling
Reverse Route Injection on the local Cisco ASA have on a configuration?
A. The local Cisco ASA advertises its default routes to the distant end of the site-to-site VPN tunnel.
B. The local Cisco ASA advertises routes from the dynamic routing protocol that is running on the local
Cisco ASA to the distant end of the site-to-site VPN tunnel.
C. The local Cisco ASA advertises routes that are at the distant end of the site-to-site VPN tunnel.
D. The local Cisco ASA advertises routes that are on its side of the site-to-site VPN tunnel to the distant
end of the site-to-site VPN tunnel.
Answer: C

NO.15 Which four statements about the Advanced Endpoint Assessment are correct? (Choose four.)
A. It examines the remote computer for personal firewall applications.
B. It examines the remote computer for antivirus applications.
C. It examines the remote computer for antispyware applications.
D. It examines the remote computer for malware applications.
E. It does not perform any remediation, but it provides input that can be evaluated by DAP records.
F. It performs active remediation by applying rules, activating modules, and providing updates where
applicable.
Answer: A,B,C,F


 
Posted 2013/4/23 6:28:18  |  Category: 미분류  |  Tag: