Ensurepass

CCNA Routing and Switching v3.0

 

QUESTION 331

Refer to the exhibit. What is the effect of the given configuration?

 

clip_image002

 

A.

It configures an inactive switch virtual interface.

B.

It configures an active management interface.

C.

It configures the native VLAN.

D.

It configures the default VLAN.

 

Correct Answer: A

 

 

QUESTION 332

Which protocol is the Cisco proprietary implementation of FHRP?

 

A.

HSRP

B.

VRRP

C.

GLBP

D.

CARP

 

Correct Answer: A

 

 

QUESTION 333

The enable secret command is used to secure access to which CLI mode?

 

A.

global configuration mode

B.

privileged EXEC mode

C.

user EXEC mode

D.

auxiliary setup mode

 

Correct Answer: B

 

 

QUESTION 334

Which two security appliances will you use in a network? (Choose two.)

 

A.

ATM

B.

IDS

C.

IOS

D.

IOX

E.

IPS

F.

SDM

 

Correct Answer: BE

 

 

QUESTION 335

If the primary root bridge experiences a power loss, which switch takes over?

 

A.

switch 0004.9A1A.C182

B.

switch 00E0.F90B.6BE3

C.

switch 00E0.F726.3DC6

D.

switch 0040.0BC0.90C5

 

Correct Answer: A

 

 

QUESTION 336

What are two benefits of private IPv4 IP addresses? (Choose two.)

 

A.

They are routed the same as public IP addresses.

B.

They are less costly than public IP addresses.

C.

They can be assigned to devices without Internet connections.

D.

They eliminate the necessity for NAT policies.

E.

They eliminate duplicate IP conflicts.

 

Correct Answer: BC

 

 

 

QUESTION 337

What is the authoritative source for an address lookup?

 

A.

a recursive DNS search

B.

the operating system cache

C.

the ISP local cache

D.

the browser cache

 

Correct Answer: A

 

 

QUESTION 338

What is the purpose of the POST operation on a router?

 

A.

determine whether additional hardware has been added

B.

locate an IOS image for booting

C.

enable a TFTP server

D.

set the configuration register

 

Correct Answer: A

 

 

QUESTION 339

After you configure the Loopback0 interface, which command can you enter to verify the status of the interface and determine whether fast switching is enabled?

 

A.

Router#show ip interface loopback 0

B.

Router#show run

C.

Router#show interface loopback 0

D.

Router#show ip interface brief

 

Correct Answer: A

 

 

QUESTION 340

Which statement about RADIUS security is true?

 

A.

It supports EAP authentication for connecting to wireless networks.

B.

It provides encrypted multiprotocol support.

C.

Device-administration packets are encrypted in their entirety.

D.

It ensures that user activity is fully anonymous.

 

Correct Answer: A

Explanation:

RADIUS Background RADIUS is an access server that uses AAA protocol. It is a system of distributed security that secures remote access to networks and network services against unauthorized access. RADIUS comprises three components:

 

clip_image004A protocol with a frame format that utilizes User Datagram Protocol (UDP)/IP.

clip_image004[1]A server.

clip_image004[2]A client.

 

The server runs on a central computer typically at the customer’s site, while the clients reside in the dial-up access servers and can be distributed throughout the network. Cisco has incorporated the RADIUS Client into Cisco IOS Software Release 11.1 and later and other device software.

Client/Server Model A network access server (NAS) operates as a client of RADIUS. The client is responsible for passing user information to designated RADIUS servers, and then acting on the response that is returned. RADIUS servers are responsible for receiving user connection requests, authenticating the user, and returning all configuration information necessary for the client to deliver service to the user. The RADIUS servers can act as proxy clients to other kinds of authentication servers. Network Security Transactions between the client and RADIUS server are authenticated through the use of a shared secret, which is never sent over the network. In addition, any user passwords are sent encrypted between the client and RADIUS server. This eliminates the possibility that someone snooping on an unsecured network could determine a user’s password.

Flexible Authentication Mechanisms The RADIUS server supports a variety of methods to authenticate a user. When it is provided with the user name and original password given by the user, it can support PPP, Password Authentication Protocol (PAP), or Challenge Handshake Authentication Protocol (CHAP), UNIX login, and other authentication mechanisms.

RADIUS does not support these protocols:

 

clip_image004[3]AppleTalk Remote Access (ARA) protocol

clip_image004[4]NetBIOS Frame Protocol Control protocol

clip_image004[5]Novell Asynchronous Services Interface (NASI)

clip_image004[6]X.25 PAD connection

 

TACACS+ offers multiprotocol support.

 

Free VCE & PDF File for Cisco 200-125 Practice Test

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …