307
185. D. The Secure Shell (SSH) protocol uses asymmetrical encryption with the use of public
and private key pairs. This not only provides encryption, it also provides authentication
of clients. Symmetrical encryption means that the same key that encrypts the information
also decrypts it, and this method is not commonly used with any remote technologies.
Code block ciphers (CBCs) are used with wireless technology to encrypt the data several
times. At-rest encryption is a term used to describe the protection of data stored and not
data in transit.
186. A. When a wireless access point is being debugged, the information is displayed by default
to the console. This information can be extended to the remote SSH or Telnet session by
using the command
terminal monitor. Logging servers must be configured and are not
created by default. Although on some higher-end switches local storage provides a method
of storage for logging, it is not the default for wireless access points.
187. A. Remote Authentication Dial-In User Service (RADIUS) was originally proposed by
the IETF and became an open standard for authentication, often used with 802.1X.
TACACS+ is a standard that was originally developed by Cisco. Kerberos is an
authentication protocol used for Active Directory authentication and was originally
created by MIT. Lightweight Directory Access Protocol (LDAP) is not an authentication
protocol; it is a helper protocol used by authentication protocols to look up objects.
188. A. Secure Shell (SSH) can use a multitude of encryption protocols; one of the encryption
protocols is Advanced Encryption Standard (AES). TACACS+ is used to authenticate
users only and provides no encryption. Hypertext Transfer Protocol Secure (HTTPS)
uses Secure Sockets Layer (SSL) to transmit data, but it does not provide AES encryption.
Remote Authentication Dial-In User Service is similar to TACACS+; both provide
authentication and do not provide encryption.
189. C. When setting up an autonomous wireless access point for the first time, you need
to connect via the console port. The network services for management are not set up by
default on a wireless access point right out of the box. HTTPS can be configured, but
by default, it is not configured since the wireless does not have an IP address right out
of the box. SSH and Telnet are also inaccessible for a wireless access point right out of
the box.
190. C. The universal console speed for all Cisco devices is 9600 baud. The connection for
Cisco equipment should be set up as 9600 baud, 8 bits of data, no flow control, and 1 stop
bit. This connection is also known as 96008N1 and should be committed to memory. All
of the other options are incorrect.
191. C. A trust boundary is the point in the network where the QoS markings are trusted from
the devices connected to it. A network administrator will create a trust boundary where
a VoIP phone will be placed. Since the VoIP phone will be trusted, the markings will be
accepted and used for priority throughout the network. The trust boundary should always
be placed closest to the IT-controlled equipment.
Do'stlaringiz bilan baham: |