여러분은 아직도 Cisco 642-618 (Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) ) 인증시험의 난이도에 대하여 고민 중입니까? 아직도 Cisco 642-618 (Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) ) 시험 때문에 밤잠도 제대로 이루지 못하면서 시험공부를 하고 계십니까? Pass4Test제품을 사용하시면 빠른 시일내에 많은 공을 들이지 않고 여러분의 꿈을 이룰수 있습니다.Pass4Test 사이트에서 제공하는 Cisco 642-618 (Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) ) 관련자료의 일부분문제와답등 샘플을 무료로 다운받아 체험해 봄으로 Pass4Test 에 믿음이 생기게 될 것입니다. Cisco 642-618 (Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) ) 인증시험을 응시하려는 분들은 Pass4Test 학습가이드의 문제와 답으로 안심하시고 자신 있게 응시하시면 됩니다. Pass4Test 는 여러분이 100% Cisco 642-618 (Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) ) 인증시험을 패스할 수 있다는 것을 보장합니다.Pass4Test는 많은 분들이 IT인증시험을 응시하여 성공하도록 도와주는 사이트입니다. Pass4Test 는 많은 IT전문가들로 구성되었습니다. Pass4Test 의 덤프는 모두 엘리트한 전문가들이 만들어낸 만큼 시험문제의 적중률은 아주 높습니다. 거의 100%의 정확도를 자랑하고 있습니다. 아마 많은 유사한 사이트들도 많습니다. 이러한 사이트에서 학습가이드와 온라인서비스도 지원되고 있습니다만 Pass4Test 는 이미 이러한 사이트를 뛰어넘은 실력으로 업계에서는 우리만의 이미지를 지키고 있습니다. Pass4Test 는 정확한 문제와 답만 제공하고 또한 그 어느 사이트보다도 빠른 업데이트로 여러분의 인증시험을 안전하게 패스하도록합니다.
NO.1 Which statement about the default ACL logging behavior of the Cisco ASA is true?
A. The Cisco ASA generates system message 106023 for each denied packet when a deny ACE is
configured.
B. The Cisco ASA generates system message 106023 for each packet that matched an ACE.
C. The Cisco ASA generates system message 106100 only for the first packet that matched an ACE.
D. The Cisco ASA generates system message 106100 for each packet that matched an ACE.
E. No ACL logging is enabled by default.
Answer: A
NO.2 Which option is not supported when the Cisco ASA is operating in transparent mode and also is using
multiple security contexts?
A. NAT
B. shared interface
C. security context resource management
D. Layer 7 inspections
E. failover
Answer: B
NO.3 Which Cisco ASA feature enables the ASA to do these two things? 1) Act as a proxy for the server and
generate a SYN-ACK response to the client SYN request. 2) When the Cisco ASA receives an ACK back
from the client, the Cisco ASA authenticates the client and allows the connection to the server.
A. TCP normalizer
B. TCP state bypass
C. TCP intercept
D. basic threat detection
E. advanced threat detection
F. botnet traffic filter
Answer: C
NO.4 In one custom dynamic application, the inside client connects to an outside server using TCP port
4444 and negotiates return client traffic in the port range of 5000 to 5500. The server then starts
streaming UDP data to the client on the negotiated port in the specified range. Which Cisco ASA feature
or command supports this custom dynamic application?
A. TCP normalizer
B. TCP intercept
C. ip verify command
D. established command
E. tcp-map and tcp-options commands
F. set connection advanced-options command
Answer: D
NO.5 When enabling a Cisco ASA to send syslog messages to a syslog server, which syslog level will
produce the most messages?
A. notifications
B. informational
C. alerts
D. emergencies
E. errors
F. debugging
Answer: F
NO.6 When will a Cisco ASA that is operating in transparent firewall mode perform a routing table lookup
instead of a MAC address table lookup to determine the outgoing interface of a packet?
A. if multiple context mode is configured
B. if the destination MAC address is unknown
C. if the destination is more than a hop away from the Cisco ASA
D. if NAT is configured
E. if dynamic ARP inspection is configured
Answer: D
NO.7 What mechanism is used on the Cisco ASA to map IP addresses to domain names that are contained in
the botnet traffic filter dynamic database or local blacklist?
A. HTTP inspection
B. DNS inspection and snooping
C. WebACL
D. dynamic botnet database fetches (updates)
E. static blacklist
F. static whitelist
Answer: B
NO.8 By default, how does the Cisco ASA authenticate itself to the Cisco ASDM users?
A. The administrator validates the Cisco ASA by examining the factory built-in identity certificate
thumbprint of the Cisco ASA.
B. The Cisco ASA automatically creates and uses a persistent self-signed X.509 certificate to authenticate
itself to the administrator.
C. The Cisco ASA automatically creates a self-signed X.509 certificate on each reboot to authenticate
itself to the administrator.
D. The Cisco ASA and the administrator use a mutual password to authenticate each other.
E. The Cisco ASA authenticates itself to the administrator using a one-time password.
Answer: C
NO.9 Refer to the exhibit.
What is a reasonable conclusion?
A. The maximum number of TCP connections that the 10.1.1.99 host can establish will be 146608.
B. All the connections from the 10.1.1.99 have completed the TCP three-way handshake.
C. The 10.1.1.99 hosts are generating a vast number of outgoing connections, probably due to a virus.
D. The 10.1.1.99 host on the inside is under a SYN flood attack.
E. The 10.1.1.99 host operations on the inside look normal.
Answer: C
NO.10 Refer to the exhibit.
Which statement about the policy map named test is true?
A. Only HTTP inspection will be applied to the TCP port 21 traffic.
B. Only FTP inspection will be applied to the TCP port 21 traffic.
C. both HTTP and FTP inspections will be applied to the TCP port 21 traffic.
D. No inspection will be applied to the TCP port 21 traffic, because the http class map configuration
conflicts with the ftp class map.
E. All FTP traffic will be denied, because the FTP traffic will fail the HTTP inspection.
Answer: B
NO.11 Which flag shown in the output of the show conn command is used to indicate that an initial SYN
packet is from the outside (lower security-level interface)?
A. B
B. D
C. b
D. A
E. a
F. i
G. I
H. O
Answer: A
NO.12 On the Cisco ASA, tcp-map can be applied to a traffic class using which MPF CLI configuration
command?
A. inspect
B. sysopt connection
C. tcp-options
D. parameters
E. set connection advanced-options
Answer: E
NO.13 Which Cisco ASA feature is implemented by the ip verify reverse-path interface interface_name
command?
A. uRPF
B. TCP intercept
C. botnet traffic filter
D. scanning threat detection
E. IPS (IP audit)
Answer: A
NO.14 In which type of environment is the Cisco ASA MPF set connection advanced-options tcp-statebypass
option the most useful?
A. SIP proxy
B. WCCP
C. BGP peering through the Cisco ASA
D. asymmetric traffic flow
E. transparent firewall
Answer: D
NO.15 Refer to the exhibit.
Which Cisco ASA feature can be configured using this Cisco ASDM screen?
A. Cisco ASA command authorization using TACACS+
B. AAA accounting to track serial, ssh, and telnet connections to the Cisco ASA
C. Exec Shell access authorization using AAA
D. cut-thru proxy
E. AAA authentication policy for Cisco ASDM access
Answer: D
NO.16 Refer to the exhibit.
Which command enables the stateful failover option?
A. failover link MYFAILOVER GigabitEthernet0/2
B. failover lan interface MYFAILOVER GigabitEthernet0/2
C. failover interface ip MYFAILOVER 172.16.5.1 255.255.255.0 standby 172.16.5.10
D. preempt
E. failover group 1 primary
F. failover lan unit primary
Answer: A
NO.17 Refer to the exhibit.
What does the * next to the CTX security context indicate?
A. The CTX context is the active context on the Cisco ASA.
B. The CTX context is the standby context on the Cisco ASA.
C. The CTX context contains the system configurations.
D. The CTX context has the admin role.
Answer: D
NO.18 By default, which traffic can pass through a Cisco ASA that is operating in transparent mode without
explicitly allowing it using an ACL.?
A. ARP
B. BPDU
C. CDP
D. OSPF multicasts
E. DHCP
Answer: A
NO.19 Refer to the exhibit.
Which statement about the MPF configuration is true?
A. Any non-RFC complaint FTP traffic will go through additional deep FTP packet inspections.
B. FTP traffic must conform to the FTP RFC, and the FTP connection will be dropped if the PUT command
is used.
C. Deep FTP packet inspections will be performed on all TCP inbound and outbound traffic on the outside
interface.
D. The ftp-pm policy-map type should be type inspect.
E. Due to a configuration error, all FTP connections through the outside interface will not be permitted.
Answer: B
NO.20 Refer to the exhibit.
What can be determined about the connection status?
A. The output is showing normal activity to the inside 10.1.1.50 web server.
B. Many HTTP connections to the 10.1.1.50 web server have successfully completed the three-way TCP
handshake.
C. Many embryonic connections are made from random sources to the 10.1.1.50 web server.
D. The 10.1.1.50 host is triggering SYN flood attacks against random hosts on the outside.
E. The 10.1.1.50 web server is terminating all the incoming HTTP connections.
Answer: C
Cisco 642-618 (Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) ) 덤프자료
Posted 2013/4/23 6:34:44 | Category: 미분류 | Tag: