You are on page 1of 16

Answer CCNA Security Chapter 10 Test CCNAS v1.

1 | Invisible Algorithm

Home

Category

Search

Sitemap

Contact Us

About

Cisco uBR7200-NPE-G2
In Stock. Best Price. Ask for Quote Used, 100% Working. 1 Year Warranty
Optiwella.com

Answer CCNA Security Chapter 10 Test CCNAS v1.1


Posted on August 5, 2012

RECENTLY WRI TTEN

Disable w3 Total Cache Plugin Completely Unable to Connect to Internet Eset Smart Security Atheros AR5007EG Windows 7 Driver Network Security Chapter 4 Packet Tracer Activity A Answer Answer CCNA Security Chapter 10 Test CCNAS v1.1

COFFEE FOR ME

SEARCH

In this post, i will share answer for Chapter 10 Test CCNA Security. All the questions in this post is based on CCNAS v1.1. The answers provided in this post has been verified to be 100%

Search

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

correct. I hope it will be a good material and guide for answering CCNA Security Chapter Test.
Login

Invisible Algorithm

In what three ways do the 5505 and 5510 Adaptive Security Appliances differ? (Choose three.) in the method by which they can be configured using either CLI or ASDM in their compatibility with Cisco SecureX technology in the maximum traffic throughput supported in the number of interfaces

on Facebook Like

105 people like


Facebook social plugin

Follow

+6
in operating system version support in types of interfaces
Find us on Google+

Which three security features do ASA models 5505 and 5510 support by default? (Choose three.) content security and control module Cisco Unified Communications (voice and video) security intrusion prevention system stateful firewall VPN concentrator Zone-Based Policy Firewall

Which option lists the ASA adaptive security algorithm session management tasks in the correct order? 1) allocating NAT translations (xlates)

CCNA SECURI TY

Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

2) establishing sessions in the fast path 3) performing route lookups 4) performing the access list checks

Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Final Exam

1) establishing sessions in the fast path 2) performing the access list checks 3) allocating NAT translations (xlates) 4) performing route lookups

1) performing route lookups 2) establishing sessions in the fast path 3) allocating NAT translations (xlates) 4) performing the access list checks

1) performing route lookups 2) allocating NAT translations (xlates) 3) performing the access list checks
RANDOM TERMS

4) establishing sessions in the fast path

matlab code to scan image using predefined mask area non rooted phone hostname atheros ar5007eg win7 bluescreen sk17i driver refer to the exhibit how can a comment be added to the beginning of this acl

1) performing the access list checks 2) performing route lookups 3) allocating NAT translations (xlates) 4) establishing sessions in the fast path

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

to identify its purpose

When the ASA recognizes that the incoming packets are part of an already established connection, which three fast path tasks are executed? (Choose three.) adjusting Layer 3 and Layer 4 headers allocating NAT translations (xlates) performing IP checksum verification performing route lookups performing TCP sequence number checks performing the access list checks

What are three characteristics of ASA transparent mode? (Choose three.) This mode does not support VPNs, QoS, or DHCP Relay. The interfaces of the ASA separate Layer 3 networks and require IP addresses in different subnets. It is the traditional firewall deployment mode. NAT can be implemented between connected networks. This mode is referred to as a bump in the wire. In this mode the ASA is invisible to an attacker.

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

Refer to the exhibit. Which three sets of configuration commands were entered on the ASA 5505? (Choose three.) interface e0/0 nameif outside security-level 0 ip address 209.165.200.226 255.255.255.248 no shut

interface e0/0 switchport access vlan 2 no shut exit

interface vlan 2 nameif outside security-level 0 ip address 209.165.200.226 255.255.255.248

ip route 0.0.0.0 0.0.0.0 209.165.200.225

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

route inside 0.0.0.0 0.0.0.0 209.165.200.225

route outside 0.0.0.0 0.0.0.0 209.165.200.225

Refer to the exhibit. According to the exhibited command output, which three statements are true about the DHCP options entered on the ASA 5505? (Choose three.) The dhcpd auto-config outside command was issued to enable the DHCP client. The dhcpd address [start-of-pool]-[end-of-pool] inside command was issued to enable the DHCP client. The dhcpd enable inside command was issued to enable the DHCP client. The dhcpd auto-config outside command was issued to enable the DHCP server. The dhcpd address [start-of-pool]-[end-of-pool] inside

command was issued to enable the DHCP server. The dhcpd enable inside command was issued to enable the DHCP server.

Which three wizards are included in Cisco ASDM 6.4? (Choose three.) ADSL Connection wizard Advanced Firewall wizard

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

High Availability and Scalability wizard Security Audit wizard Startup wizard VPN wizard

Refer to the exhibit. What will be displayed in the output of the show running-config object command after the exhibited configuration commands are entered on an ASA 5505? host 192.168.1.3 host 192.168.1.4 range 192.168.1.10 192.168.1.20 host 192.168.1.3 and host 192.168.1.4 host 192.168.1.4 and range 192.168.1.10 192.168.1.20 host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

Refer to the exhibit. Which ASDM menu sequence would be required to configure Telnet or SSH AAA authentication using a TACACS server first or the local device user database if the TACACS server authentication is unavailable? Configuration > Device Management > Management Access > ASDM/HTTPS/Telnet/SSH Configuration > Device Management > Management Access > Management Interface Configuration > Device Management > Users/AAA > AAA Access Configuration > Device Management > Users/AAA > AAA Server Group Configuration > Device Management > Users/AAA > User Accounts

Which option lists the four steps to configure the Modular Policy Framework on an ASA? 1) Configure a policy map to apply actions to the identified traffic. 2) Configure a service policy to identify which interface should be activated for the service. 3) Configure extended ACLs to identify specific granular traffic. This step may be optional.
http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

4) Configure the class map to define interesting traffic.

1) Configure a service policy to identify which interface should be activated for the service. 2) Configure extended ACLs to identify specific granular traffic. This step may be optional. 3) Configure the class map to define interesting traffic. 4) Configure a policy map to apply actions to the identified traffic.

1) Configure extended ACLs to identify specific granular traffic. This step may be optional. 2) Configure the class map to define interesting traffic. 3) Configure a policy map to apply actions to the identified traffic. 4) Configure a service policy to identify which interface should be activated for the service.

1) Configure extended ACLs to identify specific granular traffic. This step may be optional. 2) Configure the class map to define interesting traffic. 3) Configure a service policy to identify which interface should be activated for the service. 4) Configure a policy map to apply actions to the identified traffic.

Which three types of remote access VPNs are supported on ASA devices? (Choose three.)

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

Clientless SSL VPN using the Cisco AnyConnect Client Clientless SSL VPN using a web browser IPsec (IKEv1) VPN using the Cisco VPN Client IPsec (IKEv1) VPN using a web browser SSL or IPsec (IKEv2) VPN using the Cisco AnyConnect Client SSL or IPsec (IKEv2) VPN using the Cisco VPN Client

Which three components must be configured when implementing a clientless SSL VPN on an ASA 5505 device? (Choose three.) bookmark lists client address assignment client images connection profile name group policy NAT exemption rules VPN protocol (SSL or IPsec or both)

Which three components must be configured when implementing a client-based SSL VPN on an ASA 5505 device? (Choose three.) bookmark lists client address assignment client image

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

DHCP pools group policy SSL or IPsec

Refer to the exhibit. A remote host is connecting to an ASA 5505 via a VPN connection. Once authenticated, the host displays the highlighted system tray icon. On the basis of the information that is presented, what three assumptions can be made? (Choose three.) The host web browser window is displaying the ASA SSL web portal webpage containing bookmarks. The host has connected to the ASA via a client-based SSL VPN connection. The host is connected via the AnyConnect VPN client. The host is connected via the Cisco VPN client. Using the ipconfig command on the host displays one IP address from the originating network. Using the ipconfig command on the host displays an IP address from the originating network and an IP address for the VPN connection.

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

Refer to the exhibit. An administrator has entered the indicated commands on an ASA 5505. Based on the information presented, what type of remote access VPN has the administrator configured? a clientless SSL VPN via the Cisco AnyConnect Client a clientless SSL VPN via a web browser an IPsec (IKEv1) VPN via the Cisco VPN Client an IPsec (IKEv1) VPN via a web browser an SSL or IPsec (IKEv2) VPN via the Cisco AnyConnect Client an SSL or IPsec (IKEv2) VPN via a Cisco VPN Client

Which Cisco ASDM menu sequence would be used to edit a clientbased AnyConnect SSL VPN configuration? Configuration > Remote Access VPN > Advanced Configuration > Remote Access VPN > Clientless SSL VPN Access Configuration > Remote Access VPN > Easy VPN Remote Configuration > Remote Access VPN > Network (Client) Access Monitoring > VPN > VPN Sessions Monitoring > VPN > Clientless SSL VPN

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

Which three components must be configured when using the Siteto-Site VPN Connection Setup wizard in ASDM? (Choose three.) authentication method bookmarks crypto maps encryption algorithms GRE tunnel specifications IKE version

An administrator has successfully configured a site-to-site VPN on an ASA 5505. Which ASDM menu sequence displays the number of packets encrypted, decrypted, and security association requests? Configuration > Site-to-Site VPN > Advanced Configuration > Site-to-Site VPN > Connection Profiles Configuration > Site-to-Site VPN > Group Policies Monitoring > VPN > VPN Statistics > Crypto Statistics Monitoring > VPN > VPN Statistics > Encryption Statistics Monitoring > VPN > VPN Statistics > Sessions

Which two statements correctly describe the ASA as an advanced stateful firewall? (Choose two.) An ASA uses the Zone-Based Firewall feature and tracks the state of the TCP or UDP network connections that are traversing the network. In routed mode, an ASA can support two or more Layer 3 interfaces.

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

In routed mode, an ASA requires a management IP address that is configured in global configuration mode. In transparent mode, each interface has an associated security level. The first packet of a flow examined by an ASA goes through the session management path.

All the answers for CCNA Security Chapter 10 Test discussed above should be 100% correct. However, if you found any error, mistake or correction, please do not hesitate to leave comment below. We also do appreciate new questions or latest version for any question set if you want to share with all of us. I hope, the knowledge that you shared will benefits all of us. Credits: All the questions and answers in this chapter test contribute by Xase. All credit goes to him.

Vpn Connection

Cisco Vpn

Host Web

Creating a website

This entry was posted in Data Network, Network Security and tagged 2012, Answer, CCNA Security, CCNA Security Chapter 10 Answer, CCNA Security Chapter 10 Test, CCNAS Chapter 10 Test, CCNAS v1.1, Chapter 10 Test, Solution, Solution CCNA Security Chapter 10 by InviAlgo. Bookmark the permalink.

ONE THOUGHT ON ANSWER CCNA SECURITY CHAPTER 10 TEST CCNAS V1.1

Nosipho on October 9, 2012 at 12:38 PM said:

I found these answers very helpful in my studying for the upcoming exam. Please keep posting, you just saved a diploma.
Reply

Leave a Reply
Your email address will not be published. Required fields are marked *

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

Name

Email

Website

Comment

All All

Post Comment

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Search Invisible Algorithm: Which three components must be configured when implementing a client-based SSL VPN on an ASA 5505 device? (Choose three ), ccna security chapter 10 v1 1, ccnas chapter 10 v 1 1, ccna security acronym list, Refer to the exhibit Which ASDM menu sequence would be required to configure Telnet or SSH AAA authentication using a TACACS server first or the local device user database if the TACACS server authentication is unavailable?, ccna security chaper 10 answers, invialgo ccna security, ccna security chapter 10 exam answers 100, answer ccna security chapter 10 test ccnas v1 1, Which two statements correctly describe the ASA as an advanced stateful firewall? (Choose two )

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

Answer CCNA Security Chapter 10 Test CCNAS v1.1 | Invisible Algorithm

http://www.invialgo.com/2012/answer-ccna-security-chapter-10-test-ccnas-v1-1/[11/1/2012 1:22:45 AM]

You might also like