Exam information

Exam 640-553: Cisco Certified Network Associate Security (update August 31th, 2015)

Other exams

Which access list will permit HTTP traffic sourced from host 10.1.129.100 port 3030 destined to host 192.168.1.10?

Which access list will permit HTTP traffic sourced from host 10.1.129.100 port 3030 destined tohost 192.168.1.10?

Drag three proper statements about the IPsec protocol on the above to the list on the below.

DRAG DROPDrag three proper statements about the IPsec protocol on the above to the list on the below.

what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?

In a brute-force attack, what percentage of the keyspace must an attacker generally searchthrough until he or she finds the key that decrypts the data?

what is the action assigned to the traffic class "class-default"?

The information of Cisco Router and Security Device Manager(SDM) is shown below: Within the "sdm-permit" policy map, what is the action assigned to the traffic class "class-default"?

place the correct descriptions in the proper locations.

DRAG DROPOn the basis of the description of SSL-based VPN, place the correct descriptions in the properlocations.

Which statement is true?

Refer to the exhibit and partial configuration. Which statement is true?

Which of these can be used to authenticate the IPsec peers during IKE Phase 1?

Which of these can be used to authenticate the IPsec peers during IKE Phase 1?

Which description about asymmetric encryption algorithms is correct?

Which description about asymmetric encryption algorithms is correct?

which management topology keeps management traffic isolated from production traffic?

For the following items, which management topology keeps management traffic isolated fromproduction traffic?

which type of tunnel?

You work as a network engineer, do you know an IPsec tunnel is negotiated within the protectionof which type of tunnel?

Page 1 of 1512345...10...Last »