Provide Discount Cisco 640-554 With All New Questions And Answer Download Study Guide PDF

Exam A QUESTION 1

Refer to the exhibit. Which three things occur if a user attempts to log in four times within 10 seconds using
an incorrect password?
(Choose three.)

A. Subsequent virtual login attempts from the user are blocked for 60 seconds.
B. During the quiet mode, an administrator can virtually log in from any host on network 172.16.1.0/24.
C. Subsequent console login attempts are blocked for 60 seconds.
D. A message is generated indicating the username and source IP address of the user.
E. During the quiet mode, an administrator can log in from host 172.16.1.2.
F. No user can log in virtually from any host for 60 seconds.

Correct Answer: ADE
QUESTION 2
What must be configured before any Role-Based CLI views can be created?

A. aaa new-model command
B. multiple privilege levels
C. secret password for the root user
D. usernames and passwords

Correct Answer: A
QUESTION 3
What are three common examples of AAA implementation on Cisco routers? (Choose three.)
A. authenticating administrator access to the router console port, auxiliary port, and vty ports
B. authenticating remote users who are accessing the corporate LAN through IPsec VPN connections
C. implementing public key infrastructure to authenticate and authorize IPsec VPN peers using digital certificates
D. implementing command authorization with TACACS+
E. securing the router by locking down all unused services
F. tracking Cisco Netflow accounting statistics
Correct Answer: ABD
QUESTION 4

Refer to the exhibit. What information can be obtained from the AAA configuration statements?
A. The authentication method list used for Telnet is named ACCESS.
B. The authentication method list used by the console port is named ACCESS.
C. The local database is checked first when authenticating console and Telnet access to the router.
D. If the TACACS+ AAA server is not available, no users can establish a Telnet session with the router.
E. If the TACACS+ AAA server is not available, console access to the router can be authenticated using the local database.

Correct Answer: A
QUESTION 5
When logging is enabled for an ACL entry, how does the router switch packets filtered by the ACL?
A. topology-based switching
B. autonomous switching
C. process switching
D. optimum switching

Correct Answer: C
QUESTION 6
Which type of packets exiting the network of an organization should be blocked by an ACL?
A. packets that are not encrypted
B. packets that are not translated with NAT
C. packets with source IP addresses outside of the organization’s network address space
D. packets with destination IP addresses outside of the organization’s network address space

Correct Answer: C
QUESTION 7
What is a characteristic of AAA accounting?
A. Accounting can only be enabled for network connections.
B. Users are not required to be authenticated before AAA accounting logs their activities on the network.
C. Possible triggers for the aaa accounting exec default command include start-stop and stop-only.
D. Accounting is concerned with allowing and disallowing authenticated users access to certain areas and programs on the network.
Correct Answer: C
QUESTION 8
What are two disadvantages of using network IPS? (Choose two.)
A. Network IPS has a difficult time reconstructing fragmented traffic to determine if an attack was successful.
B. Network IPS is incapable of examining encrypted traffic
C. Network IPS is operating system-dependent and must be customized for each platform.
D. Network IPS is unable to provide a clear indication of the extent to which the network is being attacked.
E. Network IPS sensors are difficult to deploy when new networks are added.
Correct Answer: AB
QUESTION 9
Which type of Layer 2 attack makes a host appear as the root bridge for a LAN?
A. LAN storm
B. MAC address spoofing
C. MAC address table overflow
D. STP manipulation
E. VLAN attack

Correct Answer: D
QUESTION 10

Refer to the exhibit. Which two statements are correct regarding the configuration on switch S1? (Choose two.)
A. Port Fa0/5 storm control for broadcasts will be activated if traffic exceeds 80.1 percent of the total bandwidth.
B. Port Fa0/6 storm control for multicasts and broadcasts will be activated if traffic exceeds 2,000,000 packets per second.
C. Port Fa0/6 storm control for multicasts will be activated if traffic exceeds 2,000,000 packets per second.
D. Port Fa0/5 storm control for multicasts will be activated if traffic exceeds 80.1 percent of the total bandwidth.
E. Port Fa0/5 storm control for broadcasts and multicasts will be activated if traffic exceeds 80.1 percent of 2,000,000 packets per second.

Correct Answer: AC

 

We help you do exactly that with our high quality Cisco 640-554 Certification using the above training materials. Regardless of whichever computer you have, you just need to download one of the many PDF readers that are available for free.