Which type of Cisco IOS access control list is identified by 100 to 199 and 2000 to 2699?
D. IPv4 for 100 to 199 and IPv6 for 2000 to 2699
Which priority is most important when you plan out access control lists?
A. Build ACLs based upon your security policy.
B. Always put the ACL closest to the source of origination.
C. Place deny statements near the top of the ACL to prevent unwanted traffic from passing through the router.
D. Always test ACLs in a small, controlled production environment before you roll it out into the larger production network.
Which step is important to take when implementing secure network management?
A. Implement in-band management whenever possible.
B. Implement telnet for encrypted device management access.
C. Implement SNMP with read/write access for troubleshooting purposes.
D. Synchronize clocks on hosts and devices.
E. Implement management plane protection using routing protocol authentication.
Which statement best represents the characteristics of a VLAN?
A. Ports in a VLAN will not share broadcasts amongst physically separate switches.
B. A VLAN can only connect across a LAN within the same building.
C. A VLAN is a logical broadcast domain that can span multiple physical LAN segments.
D. A VLAN provides individual port security.
Which Layer 2 protocol provides loop resolution by managing the physical paths to given network segments?
A. root guard
B. port fast
Which statement is true when you have generated RSA keys on your Cisco router to prepare for secure device management?
A. You must then zeroize the keys to reset secure shell before configuring other parameters.
B. The SSH protocol is automatically enabled.
C. You must then specify the general-purpose key size used for authentication with the crypto key generate rsa general-keys modulus command.
D. All vty ports are automatically enabled for SSH to provide secure management.
What is the key difference between host-based and network-based intrusion prevention?
A. Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
B. Network-based IPS provides better protection against OS kernel-level attacks against hosts and servers.
C. Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
D. Host-based IPS can work in promiscuous mode or inline mode.
E. Host-based IPS is more scalable then network-based IPS.
F. Host-based IPS deployment requires less planning than network-based IPS.
Refer to the exhibit. You are a network manager for your organization. You are looking at your Syslog server reports. Based on the Syslog message shown, which two statements are true? (Choose two.)
A. Service timestamps have been globally enabled.
B. This is a normal system-generated information message and does not require further investigation.
C. This message is unimportant and can be ignored.
D. This message is a level 5 notification message.
Refer to the exhibit. Which statement is correct based on the show login command output shown?
A. When the router goes into quiet mode, any host is permitted to access the router via Telnet, SSH, and HTTP, since the quiet-mode access list has not been configured.
B. The login block-for command is configured to block login hosts for 93 seconds.
C. All logins from any sources are blocked for another 193 seconds.
D. Three or more login requests have failed within the last 100 seconds.
New Updated Passleader Cisco 640-554 Exam Dumps Free Download