CCNA(640-553)真题精选.docx
《CCNA(640-553)真题精选.docx》由会员分享,可在线阅读,更多相关《CCNA(640-553)真题精选.docx(31页珍藏版)》请在冰点文库上搜索。
![CCNA(640-553)真题精选.docx](https://file1.bingdoc.com/fileroot1/2023-5/11/8794cd97-959d-4938-b008-117214a1fb44/8794cd97-959d-4938-b008-117214a1fb441.gif)
CCNA(640-553)真题精选
[单项选择题]
1、Inabrute-forceattack,whatpercentageofmustanattackergenerallysearchthroughuntilfindsthekeythatdecryptsthedata?
()
A.Roughly50percent
B.Roughly66percent
ActualT
C.Roughly75percent
D.Roughly10percent
参考答案:
A
thekeyspaceheorshe
[单项选择题]
2、Whichdescriptioniscorrectbasedontheexhibitandpartialconfiguration?
()
A.Alltrafficdestinedfornetwork172.16.150.0willbedeniedduetotheimplicit
denyall.
B.Alltrafficfromnetwork10.0.0.0willbe
permitted.
C.Access-list101willpreventaddressspoofingfrominterfaceE0.
D.ThisACLwillpreventanyhostontheInternetfromspoofingtheinsidenetworkaddressasthesourceaddressforpacketscomingintotherouterfromthe
Internet.
参考答案:
C[单项选择题]
3、Whichdescriptionaboutasymmetricencryptionalgorithmsiscorrect?
()
A.Theyusethesamekeyforencryptionanddecryptionof
data.
B.Theyusedifferentkeysfordecryptionbutthesamekeyforencryptionof
data.
C.Theyusedifferentkeysforencryptionanddecryptionof
data.
D.Theyusethesamekeyfordecryptionbutdifferentkeysforencryptionof
data.
参考答案:
C
[单项选择题]
4、Forthefollowingitems,whichmanagementtopologykeepsmanagementtrafficisolatedfrom
ActualTproductiontraffic?
()
A.OTP
B.OOB
C.SAFE
D.MARS
参考答案:
B
[单项选择题]
5、Youworkasanetworkengineer,doyouknowanIPsectunnelisnegotiatedwithintheprotectionofwhichtypeoftunnel?
()
A.L2Ftunnel
B.L2TPtunnel
C.GREtunnel
D.ISAKMPtunnel
参考答案:
D
[单项选择题]
6、Examinethefollowingoptions,wheneditingglobalIPSsettings,whichonedeterminesiftheIOS-basedIPSfeaturewilldroporpermittrafficforaparticularIPSsignatureenginewhileanewsignatureforthatengineisbeingcompiled?
()
A.EnableSignatureDefault
B.EnableEngineFailClosed
C.EnableDefaultIOSSignature
ActualT
D.EnableFailOpened
参考答案:
B
[单项选择题]
7、WhichstatementbestdescribesCiscoIOSZone-BasedPolicyFirewall?
()
A.Arouterinterfacecanbelongtomultiple
zones.
B.Policymapsareusedtoclassifytrafficintodifferenttrafficclasses,andclassmapsareusedtoassignactiontothetraffic
classes.
C.Thepassactionworksinonlyonedirection
D.Azone-pairisbidirectionalbecauseitspecifiestrafficflowingamongtheinterfaceswithinthezone-pairinboth
directions.
参考答案:
C
[单项选择题]
8、WhichstatementbestdescribesconfiguringaccesscontrolliststocontrolTelnettrafficdestinedtotherouteritself?
()
A.TheACLappliedtothevtylineshasnoinoroutoptionlikeACLbeingappliedtoan
interface.
B.TheACLisappliedtotheTelnetportwiththeipaccess-group
command.
C.TheACLmustbeappliedtoeachvtyline
individually.
D.TheACLshouldbeappliedtoallvtylinesintheindirectiontopreventanunwanteduserfromconnectingtoanunsecured
port.
参考答案:
D
[单项选择题]
9、WhatistheMD5algorithmusedfor?
()
A.takesafixed-lengthmessageandproducesa128-bitmessagedigest
B.takesavariable-lengthmessageandproducesa168-bitmessagedigest
C.takesamessagelessthan2^64bitsasinputandproducesa160-bitmessage
digestD.takesavariable-lengthmessageandproducesa128-bitmessagedigest
ActualT
参考答案:
D
[单项选择题]
10、Forthefollowingoptions,whichoneaccuratelymatchestheCLIcommand(s)totheequivalentSDMwizardthatperformssimilarconfigurationfunctions?
()
A.aaaconfigurationcommandsandtheSDMBasicFirewallwizard
B.setupexeccommandandtheSDMSecurityAuditwizard
C.autosecureexeccommandandtheSDMOne-StepLockdownwizard
D.CiscoCommonClassificationPolicyLanguageconfigurationcommandsandtheSDMSite-to-SiteVPN
参考答案:
C
11、Basedonthefollowingitems,whichtwotypesofinterfacesarefoundonallnetwork-basedIPSsensors?
()
A.Loopbackinterface
B.Commandandcontrolinterface
C.Monitoringinterface
D.Managementinterface
参考答案:
B,C
[单项选择题]
12、Whichdescriptionistrueabouttheshowlogincommandoutputdisplayedintheexhibit?
()
A.Threeormoreloginrequestshavefailedwithinthelast100
seconds.
B.Whentheroutergoesintoquietmode,anyhostispermittedtoaccesstherouterviaTelnet,actualSSH,andHTTP,sincethequiet-modeaccesslisthasnotbeen
configured.
C.Theloginblock-forcommandisconfiguredtoblockloginhostsfor93
seconds.
D.Allloginsfromanysourcesareblockedforanother193
seconds.
参考答案:
A
13、Giventheexhibit
below.Youareanetworkmanagerofyour
company.YouarereadingyourSyslog
serverreports.OnthebasisoftheSyslogmessageshown,whichtwodescriptionsarecorrect?
()
A.Thisisanormalsystem-generatedinformationmessageanddoesnotrequirefurther
investigation.
B.Servicetimestampshavebeenglobally
enabled.
C.Thismessageisunimportantandcanbe
ignored.
D.Thismessageisalevel5notification
message.
参考答案:
B,D
[单项选择题]
14、WhatwillbeenabledbythescanningDynamicVectorStreaming(DVS)?
()
A.Firmware-levelvirusdetection
B.Signature-basedvirusfiltering
C.Layer4virusdetection
D.Signature-basedspywarefiltering
参考答案:
D
technology-The
[单项选择题]
15、WhichstatementbestdescribestherelationshipsbetweenAAAfunctionandTACACS+,RADIUSbasedontheexhibitshown?
()
A.TACACS+-P4S1andP4S4RADIUS-P4S2andP4S3
B.TACACS+-P4S2andP4S4RADIUS-P4S1andP4S3
C.TACACS+-P4S1andP4S3ActualRADIUS-P4S2andP4S4
D.TACACS+-P4S2andP4S3RADIUS-P4S1andP4S4
参考答案:
B
[单项选择题]
16、Whichkindoftabletodaytokeeptrackof()
A.reflexiveACL
B.dynamicACL
C.queuing
D.netflow
E.state
参考答案:
E
willbeusedbymostfirewallstheconnectionsthroughthefirewall?
[单项选择题]
17、Basedontheusernameglobalconfigurationmodecommanddisplayedinthe
exhibit.Whatdoestheoptionsecret5indicateabouttheenablesecretpassword?
()
A.ItishashedusingMD5
B.Itisencryptedusingaproprietaryalgorithm
C.ItishashedusingSHA
D.ItisencryptedusingDHgroup5
参考答案:
A
Cisco
encryption
[单项选择题]
18、BeforeaDiffie-Hellmanexchangemaybegin,thetwopartiesinvolvedmustagreeonwhat?
()
A.Twosecretkeys
B.Twononsecretkeys
C.Twosecretnumbers
D.Twononsecretnumbers
参考答案:
D
19、WhichthreeitemsareCiscobest-practicerecommendationsforsecuringanetwork?
()
A.Routinelyapplypatchestooperatingsystemsandapplications
B.Disableunneededservicesandportsonhosts
C.DeployHIPSsoftwareonallend-userworkstations
D.Requirestrongpasswordsandenablepasswordexpiration
参考答案:
A,B,D
[单项选择题]
20、WhatCiscoSecurityAgentInterceptorisinchargeofinterceptingallread/writerequeststothercfilesinUNIX?
()
A.Configurationinterceptor
B.Networkinterceptor
C.Filesysteminterceptor
D.Executionspaceinterceptor
参考答案:
A
[单项选择题]
21、WhichlocationwillberecommendedforextendedorextendednamedACLs?
()
A.whenusingtheestablishedkeyword,alocationclosetothedestinationpointtoensurethatreturntrafficisallowed
B.anintermediatelocationtofilterasmuchtrafficaspossible
ActualT
C.alocationasclosetothesourcetrafficaspossible
D.alocationasclosetothedestinationtrafficaspossible
参考答案:
C更多内容请访问《睦霖题库》微信公众号
[单项选择题]
22、RefertoCiscoIOSZone-BasedPolicyFirewall,willtheinspectionpolicybeapplied?
()
A.tothezone-pair
B.tothezone
C.totheinterface
D.totheglobalservicepolicy
参考答案:
A
where[单项选择题]
23、Whichstatementistrueaboutvishing?
()
A.Influencinguserstoforwardacalltoatollnumber(forexample,alongdistanceorinternationalnumber)
B.Influencinguserstoprovidepersonalinformationoverawebpage
C.Usinganinsidefacilitatortointentionallyforwardacalltoatollnumber(forexample,alongdistanceorinternationalnumber)
D.Influencinguserstoprovidepersonalinformationoverthephone
参考答案:
D
[单项选择题]
24、WhichoneofthefollowingitemsmaybeaddedtoapasswordstoredinMD5tomakeitmoresecure?
()
A.Ciphertext
B.Salt
C.Cryptotext
D.Rainbowtable
参考答案:
B
[单项选择题]
25、Whichexampleisofafunctionintendedforcryptographichashing?
()
A.MD65
B.SHA-135
C.XR12
D.MD5
参考答案:
D
[单项选择题]
26、Whichisthemaindifferencebetweenhost-basedandnetwork-basedintrusionprevention?
()
A.Host-basedIPScanworkinpromiscuousmodeorinline
mode.
B.Network-basedIPScanprovideprotectiontodesktopsandserverswithouttheneedofinstallingspecializedsoftwareontheendhostsand
servers.
C.Network-basedIPSisbettersuitedforinspectionofSSLandTLSencrypteddata
flows.
D.Host-basedIPSdeploymentrequireslessplanningthannetwork-based
IPS.
参考答案:
B
27、Whichclassesdoesthe
U.S.governmentplaceclassifieddatainto?
()
A.Top-secret
B.Confidential
C.SBU
D.Secret
参考答案:
A,B,D
28、Whichthreeoptionsarenetworkevaluationtechniques?
()
A.Performingend-usertrainingontheuseofantispywaresoftware
B.Performingvirusscans
C.ScanninganetworkforactiveIPaddressesandopenportsonthoseIPaddresses
D.Usingpassword-crackingutilities
参考答案:
B,C,D
[单项选择题]
29、Youareanetworktechnicianat
C.WhichdescriptioniscorrectwhenyouhavegeneratedRSAkeysonyourCiscoroutertoprepareforsecuredevicemanagement?
()
A.Youmustthenspecifythegeneral-purposekeysizeusedforauthenticationwiththecryptokeygeneratersageneralkeysmodulus
command.
B.Youmustthenzeroizethekeystoresetsecureshellbef