400
Appendix
■
Answers to Practice Test Questions
79. C. The command
banner login ^CCNA Routing and Switching^ will configure the
login banner to read “CCNA Routing and Switching.” The marks at the beginning and
end of the text are delimiters to mark the beginning and end of the banner. The command
login banner CCNA Routing and Switching is incorrect. The command banner
login CCNA Routing and Switching is incorrect. The command banner login ^CCNA
Routing and Switching^ is incorrect when it is configured in the line configuration
prompt.
80. A. When a user is connecting to a router via SSH, the MOTD banner is not displayed
until after the user has authenticated to the router or switch. A login banner is always
displayed pre-login. When connecting with the Telnet protocol, you must specify a login
password first. When connecting via the console, the MOTD will not be displayed. The
MOTD banner will show before the enable password is entered.
81. B. EAP-TLS, or Extensible Authentication Protocol/Transport Layer Security, uses
certificates to authenticate end devices. It also provides a layer of encryption via the
certificate infrastructure. Although EAP can be configured to use MD5 symmetrical
authentication, it is not used with TLS. Secure Shell (SSH) and passwords are not used
with EAP-TLS.
82. A. Multiprotocol Label Switching allows for varied access links such as serial leased
lines, Frame Relay, Metro Ethernet, and so on. You can leverage the existing connectivity
methods to form a private WAN. PPPoE and GRE tunnels are connectivity methods used
on top of a WAN technology, so they are invalid answers.
83. A. IPsec uses the Authentication Header (AH) protocol to check data integrity. This is
done by creating a numerical hash of the data via SHA1, SHA2, or MD5 algorithms.
The Encapsulating Security Payload (ESP) protocol is part of the IPsec suite of protocols,
and it is responsible for encryption of packets. The Internet Security Association and Key
Management Protocol (ISAKMP) is part of the Internet Key Exchange (IKE) protocol suite
and is responsible for creating a security association between two participating computers
in IPsec.
84. C. You can have only one access control list (ACL) per direction, per protocol, and per
interface. Therefore, each of the two interfaces can have both an inbound and outbound
ACL, per the protocol of IPv4. This allows for a total of four ACLs, which can be used to
control access through the router. If you added IPv6 to both interfaces, you could apply a
total of eight ACLs. All of the other options are incorrect.
85. B. The command
access-list 2 permit 192.168.2.3 0.0.0.0 will perform the same
function as
access-list 2 permit host 192.168.2.3. The command configures the
host 192.168.2.3 with a bit mask, which will only match the single IP address. Although
it can be configured as a bit mask, it should be configured via the host parameter for
readability. The command
access-list 2 permit 192.168.2.3 255.255.255.255 is
incorrect. The command
ip access-list 2 permit host 192.168.2.3 is incorrect.
The command
access-list 2 permit 192.168.2.3 is incorrect.
Chapter 7: Practice Exam 1
Do'stlaringiz bilan baham: |