Here you will find answers to Drag and Drop Questions
Notice: In the exam, some Drag and Drop Questions may be represented as multiple-choice questions.
On the basis of the description of SSL-based VPN, place the correct descriptions in the proper locations.
+ The authentication process uses hashing technologies.
+ Asymmetric algorithms are used for authentication and key exchange.
+ Symmetric algorithms are used for bulk encryption.
Which three common examples are of AAA implementation on Cisco routers? Please place the correct descriptions in the proper locations.
+ performing router commands authorization using TACACS+
+ authenticating remote users who are accessing the corporate LAN through IPSec VPN connections
+ authenticating administrator access to the router console port, auxiliary port, and vty ports
Drag two characteristics of the SDM Security Audit wizard on the above to the list on the below.
+ requires users to first identify which router interfaces connect to the inside network and which connect to the outside network
+ displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement
On the basis of the Cisco IOS Zone-Based Policy Firewall, by default, which three types of traffic are permitted by the router when some interfaces of the routers are assigned to a zone?
Drag three proper characterizations on the above to the list on the below.
+ traffic flowing among the interfaces that are members of the same zone
+ traffic flowing among the interfaces that are not assigned to any zone
+ traffic flowing to and from the router interfaces (the self zone)
Drag three proper statements about the IPsec protocol on the above to the list on the below.
Three correct statements are:
+ IPsec is a framework of open standards.
+ IPsec ensures data integrity by using checksums.
+ IPsec authenticates users and devices that can carry out communication independently.