web analytics
  • RSS

  • Polls

    What Cisco Cert Are You Currently Studying?

    View Results

    Loading ... Loading ...
  • Search on CiscoBibles

  • Popular Posts

  • Recent Comments

  • Archives

  • « | Main | »

    CCNP 642-825-Update(June-2009) New Questions

    By admin | June 4, 2009

    1. Which two features can be implemented using the Cisco SDM Advanced Firewall wizard? (Choose two.)

    A. DMZ support

    B. custom rules

    C. firewall signatures

    D. application security

    E. IP unicast reverse path forwarding

    Answer: AB

    2. What three classifications reflect the different approaches used to identify malicious traffic? (Choose three.)

    A. platform based

    B. signature based

    C. policy based

    D. regular-expression based

    E. symbol based

    F. anomaly based

    Answer: BCF

    3. Which action can be taken by Cisco IOS IPS when a packet matches a signature pattern?

    A. drop the packet

    B. reset the UDP connection

    C. block all traffic from the destination address for a specified amount of time

    D. perform a reverse path verification to determine if the source of the malicious packet was spoofed

    E. forward the malicious packet to a centralized NMS where further analysis can be taken

    Answer: A

    4. A router interface is configured with an inbound access control list and an inspection rule. How will an inbound packet on this interface be processed?

    A. It will be processed by the inbound ACL. If the packet is dropped by the ACL, then it will be processed by the inspection rule.

    B. It will be processed by the inbound ACL. If the packet is not dropped by the ACL, then it will be processed by the inspection rule.

    C. It will be processed by the inspection rule. If the packet matches the inspection rule, the inbound ACL will be invoked.

    D. It will be processed by the inspection rule. If the packet does not match the inspection rule, the inbound ACL will be invoked.

    Answer: B

    5. Which statement is true about an IPsec/GRE tunnel?

    A. The GRE tunnel source and destination addresses are specified within the IPsec transform set.

    B. An IPsec/GRE tunnel must use IPsec tunnel mode.

    C. GRE encapsulation occurs before the IPsec encryption process.

    D. Crypto map ACL is not needed to match which traffic will be protected.

    Answer: C

             

    Share and Enjoy:
    • Print
    • Digg
    • StumbleUpon
    • del.icio.us
    • Facebook
    • Yahoo! Buzz
    • Twitter
    • Google Bookmarks
    • LinkedIn
    • email
    • Live
    • MySpace

    Topics: 642-825 Exam, CCNP | 3 Comments »

    3 Responses to “CCNP 642-825-Update(June-2009) New Questions”

    1. mikemomalife Says:
      August 25th, 2009 at 7:29 pm

      please i would like to how many labs there are for the iscw exam, because i know about two of them but i can only see one on this blog. please update me.

    2. rounio Says:
      September 4th, 2009 at 3:24 am

      hi! i want to write the cwna pw0-104 exam who help me to get the pass4sure, testinside questions

    3. Kachy Says:
      September 4th, 2009 at 8:54 am

      Hi rounio,

      I donot have the pw0-104 material, and this is new certification, maybe you need to purchase it.

      And you can get the pw0-100 from here:
      http://www.examcollection.com/cwnp/CWNP.ActualTests.PW0-100.v2009-05-05.by.Ramon.616q.vce.file.html

      Good luck!
      Kachy

    Comments

    You must be logged in to post a comment.