CCDA 640-864 Q&As – Security Solutions (16-20)

June 4, 2012

Section 10 – Security Solutions

Which is the remote monitoring agent in the RMON architecture called?
A.    Tree
B.    Station
C.    Agent
D.    Probe
Answer: D

Examine the following protocols, which two are used for IP Security?
A.    Generic Routing Encapsulation (GRE) and Internetwork Packet Exchange (IPX)(EIGRP)
B.    Border Gateway Protocol (BGP) and Enhanced Interior Gateway Routing Protocol
C.    Authentication Header (AH) and Encapsulating Security Payload (ESP)
D.    Virtual Private Dial-Up Network (VPDN) and GRE
Answer: C

A common response to an attack by this device can be either to send an alert or to take corrective action. What is this device?
A.    Vulnerability assessment
B.    Firewall
C.    Intrusion-detection system (IDS)
D.    Router
Answer: C

What does the Cisco security architecture called SAFE stand for?
A.    Security Architecture for Enterprise
B.    Standard Assessment for Enterprise
C.    Security Analysis for Enterprise
D.    Standard Architecture for Enterprise
Answer: A

Which two encryption transforms will be used by both ESP and AH for authentication?
A.    HMAC-MD5 or Hash Message Authentication Code-Secure Hash Algorithm-1(HMAC-SHA-1)
B.    DES or 3DES
C.    DES or Hash Message Authentication Code-Message Digest 5 (HMAC-MD5)
D.    3DES or MD5
Answer: A

Get more CCDA 640-864 exam questions from

posted in CCDA 640-864 Q&As by admin

Powered by Wordpress and MySQL. Theme by Shlomi Noach,