Q1. DRAG DROP
Drag and drop the description on the left on to the associated item on the right.
Answer:
Explanation: Collection of similar programs that work together to execute specific tasks: Botnet
Independent malicious program copies itself: Worms
Programs that appear to have one function but actually performs a different function: Trojan horse
Programs that modify other programs: Virus
Q2. Which object table contains information about the clients know to the server in Cisco NHRP MIB
implementation?
A. NHRP Cache Table
B. NHRP Client Statistics Table
C. NHRP Purge Request Table
D. NHRP Server NHC Table
Answer: D
Q3. Refer to the exhibit. Which statement about this debug output is true ?
A. It was generated by a LAN controller when it responded to a join request from an access point
B. It was generated by a LAN controller when it generated a join request to an access point
C. It was generated by an access point when it sent a join reply message to a LAN controller
D. It was generated by an access point when it received a join request message from a LAN controller
Answer: A
Q4. Which command sequence can you enter to enable IP multicast for WCCPv2?
A. Router(config)#ip wccp web-cache service-list Router(config)#interface FastEthernet0/0
Router(config)#ip wccp web-cache group-listen
B. Router(config)#ip wccp web-cache group-list Router(config)#interface FastEthernet0/0 Router(config)#ip wccp web-cache group-listen
C. Router(config)#ip wccp web-cache group-address 224.1.1.100 Router(config)#interface FastEthernet0/0
Router(config)#ip wccp web-cache redirect in
D. Router(config)#ip wccp web-cache group-address 224.1.1.100 Router(config)#interface FastEthernet0/0
Router(config)#ip wccp web-cache group-listen
E. Router(config)#ip wccp web-cache group-address 224.1.1.100 Router(config)#interface FastEthernet0/0
Router(config)#ip wccp web-cache redirect out
Answer: D
Q5. What are the two IPSec modes? (Choose two)
A. Aggressive
B. ISAKMP
C. Transport
D. IKE
E. Main
F. Tunnel
Answer: C,F
Q6. Which three IP resources is the IANA responsible? (Choose three.)
A. IP address allocation
B. detection of spoofed address
C. criminal prosecution of hackers
D. autonomous system number allocation
E. root zone management in DNS
F. BGP protocol vulnerabilities
Answer: A,D,E
Q7. Which two statement about the multicast addresses query message are true?(choose two)
A. They are solicited when a node initialized the multicast process.
B. They are used to discover the multicast group to which listeners on a link are subscribed
C. They are used to discover whether a specified multicast address has listeners
D. They are send unsolicited when a node initializes the multicast process
E. They are usually sent only by a single router on a link
F. They are sent when a node discover a multicast group
Answer: B,C
Q8. Which two u.s government entities are authorized to execute and enforce the penalties for violations of the
Sarbanes-oxley(SOX)act?(choose two)
A. Federal trade commission (FTC.
B. internal Revenue service (IRS)
C. Office of Civil Rights (OCR)
D. federal reserve board
E. Securities and exchange commission (SEC.
F. United states Citizenship and immigration services (USCIS)
Answer: D,E
Q9. Refer to the exhibit . Which Statement about this configuration is true?
A. The ASA stops LSA type 7 packets from flooding into OSPF area 1.
B. The ASA injects a static default route into OSPF area 1.
C. The ASA redistributes routes from one OSPF process to another.
D. The ASA redistributes routes from one routing protocol to another.
E. The ASA injects a static default route into OSPF process 1.
Answer: C
Q10. Refer to the exhibit What type of attack is illustrated?
A. ICMP flood
B. ARP spoofing
C. IP address spoofing
D. CAM overflow
Answer: B
Q11. What message does the TACACS+ daemon send during the AAA authentication process to request additional authentication information?
A. ACCEPT
B. REJECT
C. CONTINUE
D. ERROR
E. REPLY
Answer: C
Q12. Which two statements about NAT-PT with IPv6 are true?(choose twp)
A. It can be configured as dynamic, static, or PAT.
B. It provides end-to-end security.
C. It supports IPv6 BVI configurations.
D. It provides support for Cisco Express Forwarding.
E. It provides ALG support for ICMP and DNS.
F. The router can be a single point of failure on the network.
Answer: A,E
Q13. What are the three response types for SCEP enrollment requests? (Choose three.)
A. PKCS#7
B. Reject
C. Pending
D. PKCS#10
E. Success
F. Renewal
Answer: B,C,E
Q14. Which two options are differences between automation and orchestration? (Choose two)
A. Automation is to be used to replace human intervention
B. Automation is focused on automating a single or multiple tasks
C. Orchestration is focused on an end-to-end process or workflow
D. Orchestration is focused on multiple technologies to be integrated together
E. Automation is an IT workflow composed of tasks, and Orchestration is a technical task
Answer: B,C
Q15. You have been asked to configure a Cisco ASA appliance in multiple mode with these settings:
(A) You need two customer contexts, named contextA and contextB
(B) Allocate interfaces G0/0 and G0/1 to contextA
(C) Allocate interfaces G0/0 and G0/2 to contextB
(D) The physical interface name for G0/1 within contextA should be "inside".
(E) All other context interfaces must be viewable via their physical interface names.
If the admin context is already defined and all interfaces are enabled, which command set will complete this configuration?
A. context contextA
config-url disk0:/contextA.cfg
allocate-interface GigabitEthernet0/0 visible allocate-interface GigabitEthernet0/1 inside context contextB
config-url disk0:/contextB.cfg
allocate-interface GigabitEthernet0/0 visible allocate-interface GigabitEthernet0/2 visible
B. context contexta
config-url disk0:/contextA.cfg
allocate-interface GigabitEthernet0/0 visible allocate-interface GigabitEthernet0/1 inside context contextb
config-url disk0:/contextB.cfg
allocate-interface GigabitEthernet0/0 visible allocate-interface GigabitEthernet0/2 visible
C. context contextA
config-url disk0:/contextA.cfg
allocate-interface GigabitEthernet0/0 invisible allocate-interface GigabitEthernet0/1 inside context contextB
config-url disk0:/contextB.cfg
allocate-interface GigabitEthernet0/0 invisible allocate-interface GigabitEthernet0/2 invisible
D. context contextA
config-url disk0:/contextA.cfg
allocate-interface GigabitEthernet0/0 allocate-interface GigabitEthernet0/1 inside context contextB
config-url disk0:/contextB.cfg
allocate-interface GigabitEthernet0/0 allocate-interface GigabitEthernet0/2
E. context contextA
config-url disk0:/contextA.cfg
allocate-interface GigabitEthernet0/0 visible allocate-interface GigabitEthernet0/1 inside context contextB
config-url disk0:/contextB.cfg
allocate-interface GigabitEthernet0/1 visible allocate-interface GigabitEthernet0/2 visible
Answer: A
Q16. Refer to the exhibitÂ
which two statement about the given IPV6 ZBF configuration are true? (Choose two)
A. It provides backward compability with legacy IPv6 inspection
B. It inspect TCP, UDP,ICMP and FTP traffic from Z1 to Z2.
C. It inspect TCP, UDP,ICMP and FTP traffic from Z2 to Z1.
D. It inspect TCP,UDP,ICMP and FTP traffic in both direction between z1 and z2.
E. It passes TCP, UDP,ICMP and FTP traffic from z1 to z2.
F. It provide backward compatibility with legacy IPv4 inseption.
Answer: A,B