IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )덤프공부

만약 아직도   CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )  인증시험 응시로 인하여 많은 시간과 정력을 소모하며 열심히 공부하고 있습니까? 아직도 어떻게 하면   CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )  인증시험을 빠르게 취득할 수 있는 방법을 못찿고 계십니까? 지금 Pass4Test에서   CCNP Security 642-648 (Deploying Cisco ASA VPN Solut ions (VPN v2.0) )  인증시험을 안전하게 넘을 수 있도록 대책을 내드리겠습니다. 아주 신기한 효과가 있을 것입니다.Pass4Test에는 전문적인 업계인사들이    CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )  시험문제와 답에 대하여 연구하여, 시험준비중인 여러분들한테 유용하고 필요한 시험가이드를 제공합니다. 만약 Pass4Test의 제품을 구매하려면, 우리Pass4Test에서는 아주 디테일 한 설명과 최신버전 최고품질의 자료를 적중율이 높은 문제와 답을 제공합니다. CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 자료는 충분한 시험대비 자료가 될 것입니다. 안심하시고 Pass4Test가 제공하는 제품을 사용하시고, 100%통과 율을 확신합니다.다른 사이트에서도   CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )  인증시험 관련 자료를 보셨다고 믿습니다. Pass4Test의 자료는 차원이 다른 완벽한 자료입니다.100%통과율은 물론 Pass4Test을 선택으로 여러분의 직장생활에 더 낳은 개변을 가져다 드립니다.

 

 

NO.1 Which three statements about clientless SSL VPN are true? (Choose three.)
A. Users are not tied to a particular PC or workstation.
B. Users have full application access to internal corporate resources.
C. Minimal IT support is required.
D. Cisco AnyConnect SSL VPN software is automatically downloaded to the remote user at the start of
the clientless session.
E. For security reasons, browser cookies are disabled for clientless SSL VPN sessions.
F. Clientless SSL VPN requires an SSL-enabled web browser.
Answer: A,C,F

NO.2 When initiating a new SSL or TLS session, the client receives the server SSL certificate and validates it.
After validating the server certificate, what does the client use the certificate for?
A. The client and server use the server public key to encrypt the SSL session data.
B. The server creates a separate session key and sends it to the client. The client decrypts the session
key by using the server public key.
C. The client and server switch to a DH key exchange to establish a session key.
D. The client generates a random session key, encrypts it with the server public key, and then sends it to
the server.
Answer: D

NO.3 Refer to the exhibit.
While configuring a site-to-site VPN tunnel, a new NOC engineer encounters the Reverse Route Injection
parameter.
Assuming that static routes are redistributed by the Cisco ASA to the IGP, what effect does enabling
Reverse Route Injection on the local Cisco ASA have on a configuration?
A. The local Cisco ASA advertises its default routes to the distant end of the site-to-site VPN tunnel.
B. The local Cisco ASA advertises routes from the dynamic routing protocol that is running on the local
Cisco ASA to the distant end of the site-to-site VPN tunnel.
C. The local Cisco ASA advertises routes that are at the distant end of the site-to-site VPN tunnel.
D. The local Cisco ASA advertises routes that are on its side of the site-to-site VPN tunnel to the distant
end of the site-to-site VPN tunnel.
Answer: C

NO.4 Refer to the exhibit.
You are configuring a laptop with the Cisco VPN Client, which uses digital certificates for authentication.
Which protocol does the Cisco VPN Client use to retrieve the digital certificate from the CA server?
A. FTP
B. LDAP
C. HTTPS
D. SCEP
E. OCSP
Answer: D

NO.5 ABC Corporation has hired a temporary worker to help out with a new project. The network
administrator gives you the task of restricting the internal clientless SSL VPN network access of the
temporary worker to one server with the IP address of 172.26.26.50 via HTTP.
Which two actions should you take to complete the assignment.? (Choose two.)
A. Configure access-list temp_acl webtype permit url http://172.26.26.50.
B. Configure access-list temp_acl_stand_ACL standard permit host 172.26.26.50.
C. Configure access-list temp_acl_extended extended permit http any host 172.26.26.50.
D. Apply the access list to the temporary worker Group Policy.
E. Apply the access list to the temporary worker Connection Profile.
F. Apply the access list to the outside interface in the inbound direction.
Answer: A,D

NO.6 Which three options are characteristics of WebType ACLs? (Choose three.)
A. They are assigned per-connection profile.
B. They are assigned per-user or per-group policy.
C. They can be defined in the Cisco AnyConnect Profile Editor.
D. They support URL pattern matching.
E. They support implicit deny all at the end of the ACL.
F. They support standard and extended WebType ACLs.
Answer: B,D,E

NO.7 When deploying clientless SSL VPN advanced application access, the administrator needs to collect
information about the end-user system. Which three input parameters of an end-user system are
important for the administrator to identify? (Choose three.)
A. types of applications and application protocols that are supported
B. types of encryption that are supported on the end-user system
C. the local privilege level of the remote user
D. types of wireless security that are applied to the end-user tunnel interface
E. types of operating systems that are supported on the end-user system
F. type of antivirus software that is supported on the end-user system
Answer: A,C,E

NO.8 In which three ways can a Cisco ASA security appliance obtain a certificate revocation list? (Choose
three.)
A. FTP
B. SCEP
C. TFTP
D. HTTP
E. LDAP
F. SCP
Answer: B,D,E

NO.9 Which four statements about the Advanced Endpoint Assessment are correct? (Choose four.)
A. It examines the remote computer for personal firewall applications.
B. It examines the remote computer for antivirus applications.
C. It examines the remote computer for antispyware applications.
D. It examines the remote computer for malware applications.
E. It does not perform any remediation, but it provides input that can be evaluated by DAP records.
F. It performs active remediation by applying rules, activating modules, and providing updates where
applicable.
Answer: A,B,C,F

NO.10 Refer to the exhibit.The ABC Corporation is changing remote-user authentication from pre-shared keys
to certificate-based authentication. For most employee authentication, its group membership (the
employees) governs corporate access. Certain management personnel need access to more confidential
servers. Access is based on the group and name, such as finance and level_2. When it is time to pilot the
new authentication policy, a finance manager is able to access the department-assigned servers but
cannot access the restricted servers.
As the network engineer, where would you look for the problem?
A. Check the validity of the identity and root certificate on the PC of the finance manager.
B. Change the Management Certificate to Connection Profile Maps > Rule Priority to a number that is
greater than 10.
C. Check if the Management Certificate to Connection Profile Maps > Rules is configured correctly.
D. Check if the Certificate to Connection Profile Maps > Policy is set correctly.
Answer: D

NO.11 Cisco Secure Desktop seeks to minimize the risks that are posed by the use of remote devices in
establishing a Cisco clientless SSL VPN or Cisco AnyConnect VPN Client session. Which two statements
concerning the Cisco Secure Desktop Host Scan feature are correct? (Choose two.)
A. It is performed before a user establishes a connection to the Cisco ASA.
B. It is performed after a user establishes a connection to the Cisco ASA but before logging in.
C. It is performed after a user logs in but before a group profile is applied.
D. It is supported on endpoints that run a Windows operating system only.
E. It is supported on endpoints that run Windows and MAC operating systems only.
F. It is supported on endpoints that run Windows, MAC, and Linux operating systems.
Answer: B,F

NO.12 Which statement about CRL configuration is correct?
A. CRL checking is enabled by default.
B. The Cisco ASA relies on HTTPS access to procure the CRL list.
C. The Cisco ASA relies on LDAP access to procure the CRL list.
D. The Cisco Secure ACS can be configured as the CRL server.
Answer: C

NO.13 Which two options are correct regarding IKE and IPv6 VPN support on the Cisco ASA using version
8.4? (Choose two.)
A. The Cisco ASA supports full IKEv2 IPv6 for site-to-site VPNs only.
B. The Cisco ASA supports full IKEv2 IPv6 for remote-access VPNs.
C. The Cisco ASA supports IKEv1 and IKEv2 configuration on the same crypto map.
D. The Cisco ASA supports negotiation of authentication type using IKEv2 with IPv6.
E. The Cisco ASA supports all types of VPN configurations when using IPv6
Answer: A,C

NO.14 When establishing a Cisco AnyConnect SSL VPN tunnel, a system administrator wants to restrict
remote home office users to either print to their local printer or send the remaining traffic down the Cisco
AnyConnect SSL VPN tunnel (with restricted Internet access).
Choose both a tunnel policy option and an ACL type to accomplish this design goal. (Choose two.)
A. tunnel all networks
B. tunnel network list below
C. exclude network list from the tunnel
D. standard ACL
E. web ACL
F. extended ACL
Answer: C,D

NO.15 Refer to the exhibit. In the CLI snippet that is shown, what is the function of the deny option in the
access list?
A. When set in conjunction with outbound connection-type bidirectional, its function is to prevent the
specified traffic from being protected by the crypto map entry.
B. When set in conjunction with connection-type originate-only, its function is to instruct the Cisco ASA to
deny specific inbound traffic if it is not encrypted.
C. When set in conjunction with outbound connection-type answer-only, its function is to instruct the Cisco
ASA to deny specific outbound traffic if it is not encrypted.
D. When set in conjunction with connection-type originate-only, its function is to cause all IP traffic that
matches the specified conditions to be protected by the crypto map.
Answer: A
Posted 2013/4/23 6:29:46  |  Category: 미분류  |  Tag: