04.04.2014 Views

640-802 CCNA Study Guide - Elktech.org

640-802 CCNA Study Guide - Elktech.org

640-802 CCNA Study Guide - Elktech.org

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

network security threats? (Choose two.)<br />

Cisco <strong>640</strong>-<strong>802</strong> Exam<br />

A. Allow unrestricted access to the console or VTY ports.<br />

B. Use a firewall to restrict access from the outside to the network devices.<br />

C. Always use Telnet to access the device command line because its data is automatically<br />

encrypted.<br />

D. Use SSH or another encrypted and authenticated transport to access device configurations.<br />

E. Prevent the loss of passwords by disabling password encryption.<br />

Answer: B,D<br />

Explanation:<br />

This question is to examine the knowledge point related to network security. Internet firewall is a or<br />

a group of systems, which will enhance the in-house network security of a mechanism. It decides<br />

which in-house services can be accessed by the outside, which people from the outside can<br />

access what in-house services and which outside services can be accessed by in-house<br />

personnel. Firewall is an Internet customs inspection post. So as to keep the effectiveness of the<br />

firewall, all the information in or out of the Internet must flow through the firewall and being<br />

checked by it. Only the authorized data is allowed to pass through the firewall and the firewall itself<br />

must be free of infiltration. Unfortunately, once the firewall system has been break through or<br />

roundabout, it is incapable of providing any protection.<br />

SSH is the abbreviation of Secure Shell, which is established by the Network Working Group of<br />

IETF. SSH is a secure protocol which is based on application layer and transport layer.<br />

QUESTION NO: 388<br />

What should be part of a comprehensive network security plan?<br />

A. Allow users to develop their own approach to network security.<br />

B. Physically secure network equipment from potential access by unauthorized individuals.<br />

C. Encourage users to use personal information in their passwords to minimize the likelihood of<br />

passwords being f<strong>org</strong>otten.<br />

D. Delay deployment of software patches and updates until their effect on end-user equipment is<br />

well known and widely reported<br />

E. Minimize network overhead by deactivating automatic antivirus client updates.<br />

Answer: B<br />

Explanation:<br />

Computer systems and networks are vulnerable to physical attack; therefore, procedures should<br />

be implemented to ensure that systems and networks are physically secure. Physical access to a<br />

"Pass Any Exam. Any Time." - www.actualtests.com 285

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!