Ensurepass  QUESTION 191 Which three statements about triple DES are true? (Choose three.)   A.      For 3DES, ANSI X9.52 describes three options for the selection of the keys in a bundle, where all keys are independent. B.      A 3DES key bundle is 192 bits long. C.      A 3DES keyspace is168 bits. D.      CBC, 64-bit CFB, OFB, and CTR are modes of 3DES. E.       Read more [...]
Posted in Uncategorized.
Ensurepass    QUESTION 171 Which four protocols are supported by Cisco IOS Management Plane Protection? (Choose four.)   A.      Blocks Extensible Exchange Protocol (BEEP) B.      Hypertext Transfer Protocol Secure (HTTPS) C.      Secure Copy Protocol (SCP) D.      Secure File Transfer Protocol (SFTP) E.       Secure Shell (SSH) F.       Read more [...]
Ensurepass  QUESTION 181 Which three statements are true about Cryptographically Generated Addresses for IPv6? (Choose three.)   A.      They prevent spoofing and stealing of existing IPv6 addresses. B.      They are derived by generating a random 128-bit IPv6 address based on the public key of the node. C.      They are used for securing neighbor discovery using SeND. D.      SHA or MD5 Read more [...]
Ensurepass  QUESTION 141 Which three statements about LDAP are true? (Choose three.)   A.      LDAP uses UDP port 389 by default. B.      LDAP is defined in terms of ASN.1 and transmitted using BER. C.      LDAP is used for accessing X.500 directory services. D.      An LDAP directory entry is uniquely identified by its DN. E.       A secure connection via TLS Read more [...]
Ensurepass  QUESTION 151 Refer to the exhibit of an ISAKMP debug. Which message of the exchange is failing?     A.      main mode 1 B.      main mode 3 C.      aggressive mode 1 D.      main mode 5 E.       aggressive mode 2   Correct Answer: B     QUESTION 152 Which Cisco IPS appliance feature can automatically adjust the risk rating of Read more [...]
Ensurepass  QUESTION 161 Which three statements are true about the Cisco NAC Appliance solution? (Choose three.)   A.      In a Layer 3 OOB ACL deployment of the Cisco NAC Appliance, the discovery host must be configured as the untrusted IP address of the Cisco NAC Appliance Server. B.      In a Cisco NAC Appliance deployment, the discovery host must be configured on a Cisco router using the "NAC discovery-host" global configuration command. Read more [...]
Ensurepass  QUESTION 121 Which two options best describe the authorization process as it relates to network access? (Choose two.)   A.      the process of identifying the validity of a certificate, and validating specific fields in the certificate against an identity store B.      the process of providing network access to the end user C.      applying enforcement controls, such as downloadable ACLs and VLAN assignment, Read more [...]
Ensurepass  QUESTION 131 Which multicast routing mechanism is optimal to support many-to-many multicast applications?   A.      PIM-SM B.      MOSPF C.      DVMRP D.      BIDIR-PIM E.       MSDP   Correct Answer: D     QUESTION 132 Which three statements regarding VLANs are true? (Choose three.)   A.      To create Read more [...]
Ensurepass  QUESTION 111 What type of attack consists of injecting traffic that is marked with the DSCP value of EF into the network?   A.      brute-force attack B.      QoS marking attack C.      DHCP starvation attack D.      SYN flood attack   Correct Answer: B     QUESTION 112 Which statement is true regarding Cisco ASA operations using software versions 8.3 and later? Read more [...]
Ensurepass  QUESTION 101 Which three nonproprietary EAP methods do not require the use of a client-side certificate for mutual authentication? (Choose three.)   A.      LEAP B.      EAP-TLS C.      PEAP D.      EAP-TTLS E.       EAP-FAST   Correct Answer: CDE     QUESTION 102 When you compare WEP to WPA (not WPA2), which three protections are gained? Read more [...]
Ensurepass  QUESTION 91 Which three statements are true about PIM-SM operations? (Choose three.)   A.      PIM-SM supports RP configuration using static RP, Auto-RP, or BSR. B.      PIM-SM uses a shared tree that is rooted at the multicast source. C.      Different RPs can be configured for different multicast groups to increase RP scalability. D.      Candidate RPs and RP mapping agents Read more [...]