IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 덤프

Pass4Test는 IT업계 전문가들이 그들의 노하우와 몇 년간의 경험 등으로 자료의 정확도를 높여 응시자들의 요구를 만족시켜 드립니다.  Pass4Test 는 꼭 한번에  CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 시험을 패스할 수 있도록 도와드릴 것입니다. 여러분은   CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) ) 시험자료 구매로 제일 정확하고 또 최신 시험 문제에 대비한 학습가이드를 사용할 수 있습니다. Pass4Test의 인증시험 적중율은 아주 높습니다. 때문에 많은 IT인증시험 준비중인 분들에게 많은 편리를 드릴수 있습니다.100%정확도 100%신뢰! 여러분은 마음 편히 응시하시면 됩니다.Pass4Test는 여러분의 시간을 절약해드릴 뿐만 아니라 여러분들이 안심하고 응시하여 순조로이 패스할수 있도록 도와주는 사이트 입니다. Pass4Test는 믿을 수 있는 사이트입니다. IT업계에서는 이미 많이 알려져 있습니다. 그리고 여러분에 신뢰를 드리기 위하여   CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )   관련자료의 일부분 문제와 답 등 샘플을 무료로 다운받아 체험해볼 수 있게 제공합니다. 아주 만족할 것이라고 믿습니다.  Pass4Test제품에 대하여 아주 자신이 있습니다. CCNP Security 642-648 (Deploying Cisco ASA VPN Solutions (VPN v2.0) )   도 여러분의 무용지물이 아닌 아주 중요한 자료가 되리라 믿습니다. 여러분께서는 아주 순조로이 시험을 패스하실 수 있을 것입니다.

 

 

NO.1 Which three statements about clientless SSL VPN are true? (Choose three.)
A. Users are not tied to a particular PC or workstation.
B. Users have full application access to internal corporate resources.
C. Minimal IT support is required.
D. Cisco AnyConnect SSL VPN software is automatically downloaded to the remote user at the start of
the clientless session.
E. For security reasons, browser cookies are disabled for clientless SSL VPN sessions.
F. Clientless SSL VPN requires an SSL-enabled web browser.
Answer: A,C,F

NO.2 Refer to the exhibit.The ABC Corporation is changing remote-user authentication from pre-shared keys
to certificate-based authentication. For most employee authentication, its group membership (the
employees) governs corporate access. Certain management personnel need access to more confidential
servers. Access is based on the group and name, such as finance and level_2. When it is time to pilot the
new authentication policy, a finance manager is able to access the department-assigned servers but
cannot access the restricted servers.
As the network engineer, where would you look for the problem?
A. Check the validity of the identity and root certificate on the PC of the finance manager.
B. Change the Management Certificate to Connection Profile Maps > Rule Priority to a number that is
greater than 10.
C. Check if the Management Certificate to Connection Profile Maps > Rules is configured correctly.
D. Check if the Certificate to Connection Profile Maps > Policy is set correctly.
Answer: D

NO.3 When initiating a new SSL or TLS session, the client receives the server SSL certificate and validates it.
After validating the server certificate, what does the client use the certificate for?
A. The client and server use the server public key to encrypt the SSL session data.
B. The server creates a separate session key and sends it to the client. The client decrypts the session
key by using the server public key.
C. The client and server switch to a DH key exchange to establish a session key.
D. The client generates a random session key, encrypts it with the server public key, and then sends it to
the server.
Answer: D

NO.4 In which three ways can a Cisco ASA security appliance obtain a certificate revocation list? (Choose
three.)
A. FTP
B. SCEP
C. TFTP
D. HTTP
E. LDAP
F. SCP
Answer: B,D,E

NO.5 When establishing a Cisco AnyConnect SSL VPN tunnel, a system administrator wants to restrict
remote home office users to either print to their local printer or send the remaining traffic down the Cisco
AnyConnect SSL VPN tunnel (with restricted Internet access).
Choose both a tunnel policy option and an ACL type to accomplish this design goal. (Choose two.)
A. tunnel all networks
B. tunnel network list below
C. exclude network list from the tunnel
D. standard ACL
E. web ACL
F. extended ACL
Answer: C,D

NO.6 Which three options are characteristics of WebType ACLs? (Choose three.)
A. They are assigned per-connection profile.
B. They are assigned per-user or per-group policy.
C. They can be defined in the Cisco AnyConnect Profile Editor.
D. They support URL pattern matching.
E. They support implicit deny all at the end of the ACL.
F. They support standard and extended WebType ACLs.
Answer: B,D,E

NO.7 Refer to the exhibit.
You are configuring a laptop with the Cisco VPN Client, which uses digital certificates for authentication.
Which protocol does the Cisco VPN Client use to retrieve the digital certificate from the CA server?
A. FTP
B. LDAP
C. HTTPS
D. SCEP
E. OCSP
Answer: D

NO.8 When deploying clientless SSL VPN advanced application access, the administrator needs to collect
information about the end-user system. Which three input parameters of an end-user system are
important for the administrator to identify? (Choose three.)
A. types of applications and application protocols that are supported
B. types of encryption that are supported on the end-user system
C. the local privilege level of the remote user
D. types of wireless security that are applied to the end-user tunnel interface
E. types of operating systems that are supported on the end-user system
F. type of antivirus software that is supported on the end-user system
Answer: A,C,E

NO.9 Which statement about CRL configuration is correct?
A. CRL checking is enabled by default.
B. The Cisco ASA relies on HTTPS access to procure the CRL list.
C. The Cisco ASA relies on LDAP access to procure the CRL list.
D. The Cisco Secure ACS can be configured as the CRL server.
Answer: C

NO.10 Cisco Secure Desktop seeks to minimize the risks that are posed by the use of remote devices in
establishing a Cisco clientless SSL VPN or Cisco AnyConnect VPN Client session. Which two statements
concerning the Cisco Secure Desktop Host Scan feature are correct? (Choose two.)
A. It is performed before a user establishes a connection to the Cisco ASA.
B. It is performed after a user establishes a connection to the Cisco ASA but before logging in.
C. It is performed after a user logs in but before a group profile is applied.
D. It is supported on endpoints that run a Windows operating system only.
E. It is supported on endpoints that run Windows and MAC operating systems only.
F. It is supported on endpoints that run Windows, MAC, and Linux operating systems.
Answer: B,F

NO.11 Which four statements about the Advanced Endpoint Assessment are correct? (Choose four.)
A. It examines the remote computer for personal firewall applications.
B. It examines the remote computer for antivirus applications.
C. It examines the remote computer for antispyware applications.
D. It examines the remote computer for malware applications.
E. It does not perform any remediation, but it provides input that can be evaluated by DAP records.
F. It performs active remediation by applying rules, activating modules, and providing updates where
applicable.
Answer: A,B,C,F

NO.12 Refer to the exhibit.
While configuring a site-to-site VPN tunnel, a new NOC engineer encounters the Reverse Route Injection
parameter.
Assuming that static routes are redistributed by the Cisco ASA to the IGP, what effect does enabling
Reverse Route Injection on the local Cisco ASA have on a configuration?
A. The local Cisco ASA advertises its default routes to the distant end of the site-to-site VPN tunnel.
B. The local Cisco ASA advertises routes from the dynamic routing protocol that is running on the local
Cisco ASA to the distant end of the site-to-site VPN tunnel.
C. The local Cisco ASA advertises routes that are at the distant end of the site-to-site VPN tunnel.
D. The local Cisco ASA advertises routes that are on its side of the site-to-site VPN tunnel to the distant
end of the site-to-site VPN tunnel.
Answer: C

NO.13 Which two options are correct regarding IKE and IPv6 VPN support on the Cisco ASA using version
8.4? (Choose two.)
A. The Cisco ASA supports full IKEv2 IPv6 for site-to-site VPNs only.
B. The Cisco ASA supports full IKEv2 IPv6 for remote-access VPNs.
C. The Cisco ASA supports IKEv1 and IKEv2 configuration on the same crypto map.
D. The Cisco ASA supports negotiation of authentication type using IKEv2 with IPv6.
E. The Cisco ASA supports all types of VPN configurations when using IPv6
Answer: A,C

NO.14 Refer to the exhibit. In the CLI snippet that is shown, what is the function of the deny option in the
access list?
A. When set in conjunction with outbound connection-type bidirectional, its function is to prevent the
specified traffic from being protected by the crypto map entry.
B. When set in conjunction with connection-type originate-only, its function is to instruct the Cisco ASA to
deny specific inbound traffic if it is not encrypted.
C. When set in conjunction with outbound connection-type answer-only, its function is to instruct the Cisco
ASA to deny specific outbound traffic if it is not encrypted.
D. When set in conjunction with connection-type originate-only, its function is to cause all IP traffic that
matches the specified conditions to be protected by the crypto map.
Answer: A

NO.15 ABC Corporation has hired a temporary worker to help out with a new project. The network
administrator gives you the task of restricting the internal clientless SSL VPN network access of the
temporary worker to one server with the IP address of 172.26.26.50 via HTTP.
Which two actions should you take to complete the assignment.? (Choose two.)
A. Configure access-list temp_acl webtype permit url http://172.26.26.50.
B. Configure access-list temp_acl_stand_ACL standard permit host 172.26.26.50.
C. Configure access-list temp_acl_extended extended permit http any host 172.26.26.50.
D. Apply the access list to the temporary worker Group Policy.
E. Apply the access list to the temporary worker Connection Profile.
F. Apply the access list to the outside interface in the inbound direction.
Answer: A,D


 
Posted 2013/4/23 6:30:47  |  Category: 미분류  |  Tag: