Ccna certification Practice Tests



Download 8,04 Mb.
Pdf ko'rish
bet441/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   437   438   439   440   441   442   443   444   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

307

 185.  D.  The Secure Shell (SSH) protocol uses asymmetrical encryption with the use of public 

and private key pairs. This not only provides encryption, it also provides authentication 

of clients. Symmetrical encryption means that the same key that encrypts the information 

also decrypts it, and this method is not commonly used with any remote technologies. 

Code block ciphers (CBCs) are used with wireless technology to encrypt the data several 

times. At-rest encryption is a term used to describe the protection of data stored and not 

data in transit.

 186.  A.  When a wireless access point is being debugged, the information is displayed by default 

to the console. This information can be extended to the remote SSH or Telnet session by 

using the command 

terminal monitor. Logging servers must be configured and are not 

created by default. Although on some higher-end switches local storage provides a method 

of storage for logging, it is not the default for wireless access points.



 187.  A.  Remote Authentication Dial-In User Service (RADIUS) was originally proposed by 

the IETF and became an open standard for authentication, often used with 802.1X. 

TACACS+ is a standard that was originally developed by Cisco. Kerberos is an 

authentication protocol used for Active Directory authentication and was originally 

created by MIT. Lightweight Directory Access Protocol (LDAP) is not an authentication 

protocol; it is a helper protocol used by authentication protocols to look up objects.



 188.  A.  Secure Shell (SSH) can use a multitude of encryption protocols; one of the encryption 

protocols is Advanced Encryption Standard (AES). TACACS+ is used to authenticate 

users only and provides no encryption. Hypertext Transfer Protocol Secure (HTTPS) 

uses Secure Sockets Layer (SSL) to transmit data, but it does not provide AES encryption. 

Remote Authentication Dial-In User Service is similar to TACACS+; both provide 

authentication and do not provide encryption.



 189.  C.  When setting up an autonomous wireless access point for the first time, you need  

to connect via the console port. The network services for management are not set up by 

default on a wireless access point right out of the box. HTTPS can be configured, but  

by default, it is not configured since the wireless does not have an IP address right out  

of the box. SSH and Telnet are also inaccessible for a wireless access point right out of  

the box.


 190.  C.  The universal console speed for all Cisco devices is 9600 baud. The connection for 

Cisco equipment should be set up as 9600 baud, 8 bits of data, no flow control, and 1 stop 

bit. This connection is also known as 96008N1 and should be committed to memory. All 

of the other options are incorrect.



 191.  C.  A trust boundary is the point in the network where the QoS markings are trusted from 

the devices connected to it. A network administrator will create a trust boundary where 

a VoIP phone will be placed. Since the VoIP phone will be trusted, the markings will be 

accepted and used for priority throughout the network. The trust boundary should always 

be placed closest to the IT-controlled equipment.




Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   437   438   439   440   441   442   443   444   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish