CCNA Real Q&As 007

EnsurepassWhich two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4?(Choose two.) A. It establishes a static route to the 172.16.3.0 network. B. It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network. C. It creates a static route to the 192.168.2.0 network. D. It uses the default administrative distance. E. It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4. F. Read more [...]

CCNA Real Q&As 006

EnsurepassWhich two benefits can be obtained by using VTP in a switching environment? (Choose two.) A. Allowing frames from multiple VLANs to use a single interface. B. Allowing switches to read frame tags. C. Maintaining VLAN consistency across a switched network. D. Allowing VLAN information to be automatically propagated throughout the switching environment. E. It allows ports to be assigned to VLANs automatically. Correct Answer: CD Explanation: VTP minimizes the possible configuration Read more [...]

CCNA Real Q&As 005

EnsurepassYour Company has installed IP phones. Both the phones and the office computers connect to the same device. The phone traffic and the office computer data traffic must be on different networks to ensure maximum throughput for the phone data. Which network device can be best connected to the phones and computers, and which technology will be performed on this device? (Choose two.) A. hub B. router C. switch D. stp E. subinterfaces F. VLAN Correct Answer: CF Explanation: You can Read more [...]

CCNA Real Q&As 004

EnsurepassWhat are two reasons a network administrator would use CDP? (Choose two.) A. to obtain VLAN information from directly connected switches B. to determine the status of network services on a remote device C. to determine the status of the routing protocols between directly connected routers D. to verify the type of cable interconnecting two devices E. to verify Layer 2 connectivity between two devices when Layer 3 fails F. to obtain the IP address of a connected device in order to telnet Read more [...]

CCNA Real Q&As 003

EnsurepassCisco IOS (originally Internetwork Operating System) is the software used on the vast majority of Cisco Systems routers and all current Cisco network switches. Which two of the following devices could you configure as a source for the IOS image in the boot system command? (Choose two.) A. RAM B. NVRAM C. flash memory D. HTTP server E. TFTP server F. Telnet server Correct Answer: CE HOT EXAM! 100-105 Dumps VCE PDF 200-105 Dumps VCE PDF 300-101 Dumps VCE PDF 300-115 Dumps Read more [...]

CCNA Real Q&As 002

EnsurepassIf you are a network administrator, how will you explain VTP configuration to a new technician? (Choose three.) A. In the VTP client mode, a switch is unable to update its local VLAN database. B. Configure a trunk link between the switches to forward VTP updates. C. In the VTP server mode, a switch is able to update a switch in the VTP transparent mode. D. In the VTP transparent mode, a switch will forward the received updates to other switches. E. A switch in the VTP server mode only Read more [...]

CCNA Real Q&As 001

EnsurepassBefore installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.) A. the amount of available ROM B. the amount of available flash and RAM memory C. the version of the bootstrap software present on the router D. show version E. show processes F. show running-config Correct Answer: BD HOT EXAM! 100-105 Dumps VCE PDF 200-105 Dumps VCE PDF 300-101 Dumps VCE PDF 300-115 Dumps Read more [...]

» Security Device Manager SDM

EnsurepassHere you will find answers to Security  Device  Manager SDM Questions Question 1 For the following options, which one accurately matches the CU command(s) to the equivalent SDM wizard that performs similar configuration functions? A. setup exec command and the SDM Security Audit wizard B. auto secure exec command and the SDM One-Step Lockdown wizard C. aaa configuration commands and the SDM Basic Firewall wizard D. Cisco Common Classification Policy Language configuration commands Read more [...]

» IPsec Questions

EnsurepassHere you will find answers to IPsec Questions Question 1 Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. IPsec operation requires which two functions? (Choose two) A. using PKI for pre-shared-key authentication B. using AH protocols for encryption and authentication C. using IKE to negotiate the SA D. using Diffie-Hellman to establish a shared-secret key   Answer: Read more [...]

» Implementing Firewall Technologies

EnsurepassHere you will find answers to Implementing Firewall Technologies Questions Question 1 Which kind of table will be used by most firewalls today to keep track of the connections through the firewall? A. queuing B. netflow C. dynamic ACL D. reflexive ACL E. state   Answer: E Explanation There are four generations of firewall technologies developed between 1983 and 1995: static packet-filtering firewalls, circuit-level firewalls, application layer firewalls and dynamic packet-filtering Read more [...]

» Authentication Authorization & Accounting

EnsurepassHere you will find answers to Authentication Authorization & Accounting Questions Question 1 How do you define the authentication method that will be used with AAA? A. With a method list B. With the method command C. With the method aaa command D. With a method statement   Answer: A Explanation A method list is a sequential list of authentication methods to query to authenticate a user. Method lists enable you to designate one or more security protocols to be used for authentication, Read more [...]

» Managing a Secure Network

EnsurepassHere you will find answers to Managing a Secure Network Questions Question 1 For the following attempts, which one is to ensure that no employee becomes a pervasive security threat, that data can be recovered from backups, and that information system changes do not compromise a system’s security? A.    Disaster recovery B.    Strategic security planning C.    Implementation security D.    Operations security   Answer: D Note: Operations security: day-to-day security Read more [...]

» Securing Network Devices

EnsurepassHere you will find answers to Securing Network Devices Questions Question 1 As a network engineer at securitytut.com, you are responsible for the network. Which one will be necessarily taken into consideration when implementing Syslogging in your network? A. Log all messages to the system buffer so that they can be displayed when accessing the router. B. Use SSH to access your Syslog information. C. Enable the highest level of Syslogging available to ensure you log all possible event Read more [...]

» Implementing Virtual Private Networks

EnsurepassHere you will find answers to Implementing Virtual Private Networks Questions Question 1 You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of which type of tunnel? A. GRE tunnel B. L2TP tunnel C. L2F tunnel D. ISAKMP tunnel   Answer: D Question 2 For the following items, which one acts as a VPN termination device and is located at a primary network location? A. Headend VPN device B. Tunnel C. Broadband service D. VPN access device   Answer: Read more [...]

» Modern Network Security Threats

EnsurepassHere you will find answers to Modern Network Security Questions Question 1 Which item is the great majority of software vulnerabilities that have been discovered? A. Stack vulnerabilities B. Software overflows C. Heap overflows D. Buffer overflows   Answer: D Question 2 Which statement is true about vishing? A. Influencing users to forward a call to a toll number (for example, a long distance or international number) B. Influencing users to provide personal information over the Read more [...]

» Cryptographic Systems

EnsurepassHere you will find answers to Cryptographic Systems Questions   Question 1 Please choose the correct matching relationships between the cryptography algorithms and the type of algorithm. 1 3DES 2 RSA 3 Diffie-Hellman 4 AES 5 IDEA 6 Elliptical Curve A. Symmetric – 1, 2 and 3 Asymmetric – 4, 5 and 6 B. Symmetric – 1, 4 and 5 Asymmetric – 2, 3 and 6 C. Symmetric – 2, 4 and 5 Asymmetric – 1, 3 and 6 D. Symmetric – 2, 5 and 6 Asymmetric – 1, 3 and 4   Answer: Read more [...]