Archive for the ‘CCSP’ Category

NowExam! 642-515 dumps:: 642-515 study guides,the latest 642-515 courses materials

Tuesday, May 4th, 2010

Securing Hosts Using Cisco Security Agent Exam (HIPS) (642-515 Exam) Questions & Answers are created by our certified senior experts combination PROMETRIC or VUE true-to-date environmental examination of the original title.we promised that the 642-515 Q&A coverage of 98%. All of our content is custom written and kept current with several monthly updates on most of our products. As a Nowexam CCVP Certification candidate, you will have access to our updates for one year after the purchase date.
Cisco Certification 642-515 Braindumps page all the necessary 642-515 certification guide is available which not only includes Securing Hosts Using Cisco Security Agent Exam (HIPS) Modeler but it also contains 642-515 Study Guide and practice exam.Our specialists who had created our Securing Hosts Using Cisco Security Agent Exam (HIPS) Modeler Study Guide and Cisco Study Guide are certified by the vendors in which they prepare the tests. That is why you shouldn’t hesitate about our material quality, it is of the highest rank. You get the updated version.Our products are top quality and will assist you in gaining a true understanding of 642-515 technologies, without resorting to 642-515 Study Guide. Stop wasting time and money re-taking failed certification exams and start becoming more productive.Boost your career and your potential earnings. Purchase the 642-515 Nowexam products today and begin the path to success!
Nowexam Free Product CCVP 642-515 Exam Demo.For example:2. Tom works as a network administrator for the CISCO company. The primary adaptive security appliance in an active/standby failover configuration failed, so the secondary adaptive security appliance was automatically activated. Tom then fixed the problem. Now he would like to restore the primary to active status. Which one of the following commands can reactivate the primary adaptive security appliance and restore it to active status while issued on the primary adaptive security appliance?
A. failover reset
B. failover primary active
C. failover active
D. failover exec standby
Answer: CÂ
3. You work as a network administrator for your company. Study the exhibit carefully. ASDM is short for Adaptive Security Device Manager. You are responsible for multiple remote Cisco ASA security appliances administered through Cisco ASDM. Recently, you have been tasked to configure one of these Cisco ASA security appliances for SSL VPNs and are requiring a client certificate, as shown. How will this configuration affect your next ASDM connection to this Cisco ASA security appliance? Â
A. You would be required to download the identity certificate of the remote Cisco ASA security appliance.
B. You would be asked to present an identity certificate. If you did not have one, the Cisco ASA security appliance would prompt you for authentication credentials, consisting of a username and password.
C. Your connection would be handled the way it is always handled by this Cisco ASA security appliance.
D. You would be required to have an identity certificate that the Cisco ASA security appliance can use for authentication.
Answer: DÂ
4. Which three statements correctly describe protocol inspection on the Cisco ASA adaptive security appliance? (Choose three.)
A. For the security appliance to inspect packets for signs of malicious application misuse, you must enable advanced (application layer) protocol inspection.
B. If you want to enable inspection globally for a protocol that is not inspected by default or if you want to
globally disable inspection for a protocol, you can edit the default global policy.
C. The protocol inspection feature of the security appliance securely opens and closes negotiated ports and IP addresses for legitimate client-server connections through the security appliance.
D. If inspection for a protocol is not enabled, traffic for that protocol may be blocked.
Answer: BCDÂ
5. Study the following exhibit carefully. You work as the network administrator of a corporate Cisco ASA security appliance with a Cisco ASA AIP-SSM. You are asked to use the AIP-SSM to protect corporate DMZ web servers. The AIP-SSM has been configured, and a service policy has been configured to identify the traffic to be passed to the AIP-SSM.
On which two interfaces would application of the service policy for the AIP-SSM be most effective while causing the least amount of impact to Cisco ASA security appliance performance? (Choose two.)

NowExam! 642-513 dumps:: 642-513 study guides,the latest 642-513 courses materials

Tuesday, May 4th, 2010

Securing Hosts Using Cisco Security Agent Exam (HIPS) (642-513 Exam) Questions & Answers are created by our certified senior experts combination PROMETRIC or VUE true-to-date environmental examination of the original title.we promised that the 642-513 Q&A coverage of 98%. All of our content is custom written and kept current with several monthly updates on most of our products. As a Nowexam CCVP Certification candidate, you will have access to our updates for one year after the purchase date.
Cisco Certification 642-513 Braindumps page all the necessary 642-513 certification guide is available which not only includes Securing Hosts Using Cisco Security Agent Exam (HIPS) Modeler but it also contains 642-513 Study Guide and practice exam.Our specialists who had created our Securing Hosts Using Cisco Security Agent Exam (HIPS) Modeler Study Guide and Cisco Study Guide are certified by the vendors in which they prepare the tests. That is why you shouldn’t hesitate about our material quality, it is of the highest rank. You get the updated version.Our products are top quality and will assist you in gaining a true understanding of 642-513 technologies, without resorting to 642-513 Study Guide. Stop wasting time and money re-taking failed certification exams and start becoming more productive.Boost your career and your potential earnings. Purchase the 642-513 Nowexam products today and begin the path to success!
Nowexam Free Product CCVP 642-513 Exam Demo.For example:1. For which layers of the OSI reference model does CSA enforce security?
A. Layer 1 through Layer 4Â
B. Layer 1 through Layer 7Â
C. Layer 2 through Layer 4Â
D. Layer 3 through Layer 7Â
Answer:D Â
2. Cisco Security Agent provides Day Zero attack prevention by using which of these methods?Â
A. using signatures to enforce security policiesÂ
B. using API control to enforce security policies
C. using stateful packet filtering to enforce security policiesÂ
D. using algorithms that compare application calls for system resources to the security policies
Answer:D Â
3. Which one of the five phases of an attack attempts to become resident on a target?Â
A. probe phaseÂ
B. penetrate phase
C. persist phaseÂ
D. propagate phaseÂ
E. paralyze phaseÂ
Answer:C Â
4. Which two attacks could an attacker use during the probe phase of an attack? (Choose two.)Â
A. buffer overflow
B. install new code
C. ping scansÂ
D. erase filesÂ
E. port scansÂ
Answer:CE Â
5. Which two attacks could an attacker use during the penetrate phase of an attack? (Choose two.)Â
A. install new codeÂ
B. modify configurationÂ
C. ping scansÂ
D. buffer overflow
E. erase files
F. e-mail attachmentÂ
Answer:DF

NowExam! 642-504 dumps:: 642-504 study guides,the latest 642-504 courses materials

Monday, May 3rd, 2010

Securing Networks with Cisco Routers and Switches (642-504 Exam) Questions & Answers are created by our certified senior experts combination PROMETRIC or VUE true-to-date environmental examination of the original title.we promised that the 642-504 Q&A coverage of 98%. All of our content is custom written and kept current with several monthly updates on most of our products. As a Nowexam CCSP Certification candidate, you will have access to our updates for one year after the purchase date.
Cisco Certification 642-504 Braindumps page all the necessary 642-504 certification guide is available which not only includes Securing Networks with Cisco Routers and Switches Modeler but it also contains 642-504 Study Guide and practice exam.Our specialists who had created our Securing Networks with Cisco Routers and Switches Modeler Study Guide and Cisco Study Guide are certified by the vendors in which they prepare the tests. That is why you shouldn’t hesitate about our material quality, it is of the highest rank. You get the updated version.Our products are top quality and will assist you in gaining a true understanding of 642-504 technologies, without resorting to 642-504 Study Guide. Stop wasting time and money re-taking failed certification exams and start becoming more productive.Boost your career and your potential earnings. Purchase the 642-504 Nowexam products today and begin the path to success!
Nowexam Free Product CCSP 642-504 Exam Demo.For example:1. Which two are technologies that secure the control plane of the Cisco router? (Choose two.)
A. Cisco IOS Flexible Packet Matching
B. uRPF
C. routing protocol authentication
D. CPPr
E. BPDU protection
F. role-based access control
Answer: CDÂ
2. What are the two category types associated with 5.x signature use in Cisco IOS IPS? (Choose two.)
A. basic
B. advanced
C. 128MB.sdf
D. 256MB.sdf
E. attack-drop
F. built-in
Answer: AB
4. Which is an advantage of implementing the Cisco IOS Firewall feature?
A. provides self-contained end-user authentication capabilities
B. integrates multiprotocol routing with security policy enforcement
C. acts primarily as a dedicated firewall device
D. is easily deployed and managed by the Cisco Adaptive Security Device Manager
E. provides data leakage protection capabilities
Answer: BÂ
5. Which three statements correctly describe the GET VPN policy management? (Choose three.)
A. A central policy is defined at the ACS (AAA) server.
B. A local policy is defined on each group member.
C. A global policy is defined on the key server, and it is distributed to the group members.
D. The key server and group member policy must match.
E. The group member appends the global policy to its local policy.
Answer: BCEÂ
6. The CPU and Memory Threshold Notifications of  the Network Foundation Protection feature protects which router plane?
A. control plane
B. management plane
C. data plane
D. network plane
Answer: B

NowExam! 642-503 dumps:: 642-503 study guides,the latest 642-503 courses materials

Monday, May 3rd, 2010

Securing Networks with Cisco Routers and Switches (642-503 Exam) Questions & Answers are created by our certified senior experts combination PROMETRIC or VUE true-to-date environmental examination of the original title.we promised that the 642-503 Q&A coverage of 98%. All of our content is custom written and kept current with several monthly updates on most of our products. As a Nowexam CCSP Certification candidate, you will have access to our updates for one year after the purchase date.
Cisco Certification 642-503 Braindumps page all the necessary 642-503 certification guide is available which not only includes Securing Networks with Cisco Routers and Switches Modeler but it also contains 642-503 Study Guide and practice exam.Our specialists who had created our Securing Networks with Cisco Routers and Switches Modeler Study Guide and Cisco Study Guide are certified by the vendors in which they prepare the tests. That is why you shouldn’t hesitate about our material quality, it is of the highest rank. You get the updated version.Our products are top quality and will assist you in gaining a true understanding of 642-503 technologies, without resorting to 642-503 Study Guide. Stop wasting time and money re-taking failed certification exams and start becoming more productive.Boost your career and your potential earnings. Purchase the 642-503 Nowexam products today and begin the path to success!
Nowexam Free Product CCSP 642-503 Exam Demo.For example:Â
1. Which two statements are true regarding classic Cisco IOS Firewall configurations? (Choose two.)Â
A. You can apply the IP inspection rule in the inbound direction on the trusted interface.Â
B. You can apply the IP inspection rule in the outbound direction on the untrusted interface.Â
C. For temporary openings to be created dynamically by Cisco IOS Firewall, the access list for the returning traffic must be a standard ACL.Â
D. For temporary openings to be created dynamically by Cisco IOS Firewall, you must apply the IP inspectionrule to the trusted interface.Â
E. For temporary openings to be created dynamically by Cisco IOS Firewall, the inbound access list on the trustedinterface must be an extended ACL.Â
Answer: AB
5. Which three configurations are required to enable the Cisco IOS Firewall to inspect a user-defined application which uses TCP ports 8000 and 8001? (Choose three.)Â
A. access-list 101 permit tcp any any eq 8000 access-list 101 permit tcp any any eq 8001 class-map user-10 match access-group 101
B. policy-map user-10 class user-10 inspect
C. ip port-map user-10 port tcp 8000 8001 description “TEST PROTOCOL”
D. ip inspect name test appfw user-10Â
E. ip inspect name test user-10
F. int {type|number} ip inpsect name test in
Answer: CEF
9. Which three of these statements are correct regarding DMVPN configuration? (Choose three.)Â
A. If running EIGRP over DMVPN, the hub router tunnel interface must have “next hop self” enabled: ip next-hop-self eigrp AS-NumberÂ
B. If running EIGRP over DMVPN, the hub router tunnel interface must have split horizon disabled: no ip split-horizon eigrp AS-NumberÂ
C. The spoke routers must be configured as the NHRP servers: ip nhrp nhs spoke-tunnel-ip-address
D. At the spoke routers, static NHRP mapping to the hub router is required: ip nhrp map hub-tunnel-ip-address hub-physical-ip-addressÂ
E. The GRE tunnel mode must be set to point-to-point mode: tunnel mode gre point-to-pointÂ
F. The GRE tunnel must be associated with an IPsec profile: tunnel protection ipsec profile profile-name
Answer: BDF Â
10. When you configure Cisco IOS WebVPN, you can use the port-forward command to enable which function?Â
A. web-enabled applications
B. Cisco Secure DesktopÂ
C. full-tunnel client
D. thin clientE. CIFSÂ
F. OWA
Answer: D

NowExam! 642-502 dumps:: 642-502 study guides,the latest 642-502 courses materials

Monday, May 3rd, 2010

Securing Networks with Cisco Routers and Switches Exam SNRS (642-502 Exam) Questions & Answers are created by our certified senior experts combination PROMETRIC or VUE true-to-date environmental examination of the original title.we promised that the 642-502 Q&A coverage of 98%. All of our content is custom written and kept current with several monthly updates on most of our products. As a Nowexam CCSP Certification candidate, you will have access to our updates for one year after the purchase date.
Cisco Certification 642-502 Braindumps page all the necessary 642-502 certification guide is available which not only includes Securing Networks with Cisco Routers and Switches Exam SNRS  Modeler but it also contains 642-502 Study Guide and practice exam.Our specialists who had created our Securing Networks with Cisco Routers and Switches Exam SNRS  Modeler Study Guide and Cisco Study Guide are certified by the vendors in which they prepare the tests. That is why you shouldn’t hesitate about our material quality, it is of the highest rank. You get the updated version.Our products are top quality and will assist you in gaining a true understanding of 642-502 technologies, without resorting to 642-502 Study Guide. Stop wasting time and money re-taking failed certification exams and start becoming more productive.Boost your career and your potential earnings. Purchase the 642-502 Nowexam products today and begin the path to success!
Nowexam Free Product CCSP 642-502 Exam Demo.For example:1.What are the two functions that crypto ACLs perform on outbound traffic? Choose two.
A.bypasses outbound traffic that should be protected by IPSec
B.selects inbound traffic
C.selects outbound traffic that should be protected by IPSec
D.sends outbound traffic that should not be protected by IPSec as clear text
E.discards outbound traffic that should not be protected by IPSec
F.discards outboun
Correct:C D
6.Where  are  access  profiles  stored  with  the  authentication  proxy  features  of  the  Cisco  IOS Firewall?
A.PIX Firewall
B.Cisco router
C.Cisco VPN Concentrator
D.Cisco Secure ACS authentication server
Correct:DÂ
7.Choose the correct command to allow IKE to establish the IPSec security associations.
A.crypto map 10 isakmp
B.crypto map 10 manual
C.crypto map MYMAP ipsec-isakmp
D.crypto map MYMAP ipsec-manual
E.crypto map MYMAP 10 ipsec-isakmp
F.crypto map MYMAP 10 ipsec-manual
Correct:EÂ
8.Choose the correct command to generate two RSA key pairs for use with certificate authority.
A.key generate rsa general-keys
B.key generate rsa usage-keys
C.crypto key generate rsa general-keys
D.crypto key generate rsa usage-keys
E.enable crypto key generate rsa general-keys
F.enable crypto key generate rsa usage-keys
Correct:DÂ
9.Which command is required to specify the authorization protocol for authentication proxy?
A.auth-proxy group tacacs+
B.aaa auth-proxy default group tacacs+
C.authorization auth-proxy default group tacacs+
D.aaa authorization auth-proxy default group tacacs+
E.aaa authorization auth-proxy group tacacs+
F.aaa authorization auth-proxy default group
Correct:DÂ
10.Which Cisco Catalyst IOS command can be used to mitigate a CAM table overflow attack?
A.switch(config-if)# port-security maximum 1
B.switch(config)# switchport port-security
C.switch(config-if)# port-security
D.switch(config-if)# switchport port-security maximum 1
E.switch(config-if)# switchport access
F.switch(config-if)# access maximum 1
Correct:D

Categories