Archive for February, 2017

CCNA FSD , CCNA Faisalabad by Cisco Certified Trainers Only
CCNAX 200-125 by Saeed Ahmad

Admission Open
5Days per Week Class Available
100% Certification Guarantee

Cisco Networking Academy  

Save Money

Career Institute of Advance Computer Studies
Address: P – 49 Chenab Market, Susan Road,
Madina Town, Faisalabad, Pakistan
Tel: +92 41 854 29 50 / Cell: +92 300 766 2050
E-mail: info@career.edu.pk  URL: http://career.edu.pk

What’s the technology that you can use to prevent non malicious program to run in the computer that is disconnected from the network?
A. Firewall
B. Software Antivirus
C. Network IPS
D. Host IPS.

What command could you implement in the firewall to conceal internal IP address?

Command ip ospf authentication key 1 is implemented in which level.
A. Interface
B. process
C. global
D. enable

Which of the following pairs of statements is true in terms of configuring MD authentication?
a. Interface statements (OSPF, EIGRP) must be configured; use of key chain in OSPF
b. Router process (OSPF, EIGRP) must be configured; key chain in EIGRP
c. Router process (only for OSPF) must be configured; key chain in EIGRP
d. Router process (only for OSPF) must be configured; key chain in OSPF

Which two NAT types allows only objects or groups to reference an IP address? (choose two)
A.dynamic NAT
B.dynamic PAT
C.static NAT
D.identity NAT

Which command help user1 to use enable,disable,exit&etc commands?
A. catalyst1(config)#username user1 privilege 0 secret us1pass
B. catalyst1(config)#username user1 privilege 1 secret us1pass
C. catalyst1(config)#username user1 privilege 2 secret us1pass
D. catalyst1(config)#username user1 privilege 5 secret us1pass

Which command enable ospf authentication?
A. ip ospf authentication message-digest
B. network 192.168.10.0 0.0.0.255 area 0
C. area 20 authentication message-digest
D. ip ospf message-digest-key 1 md5 CCNA

There was another CIA question as well, different from the 179q dump but can’t remember the verbage.

These are the only ones that I can recall. There were others but as everyone else has been saying, roughly 15-20 new questions.

TCP connection (pick 2)
A. SYN-RCVD
B. WAIT
C. SYN-WAIT
D. RCVD
E. SENT

Campus question for sure, a couple IP ospf commands, all new questions shared below are on there.

 

  1. What’s the technology that you can use to prevent non malicious program to run in the computer that is disconnected from the network?
    A. Firewall
    B. Software Antivirus
    C. Network IPS
    D. Host IPS. (correct)

HIPS is correct because it cheacks agaisnt policies for permissions to run or not run something, antivirus is looking for malicious pograms, the questions says NON malicious

2.What command could you implement in the firewall to conceal internal IP address?

(This question was on my exam)

3.Which statement about college campus is true?
A. College campus has geographical position.
B. College campus Hasn`t got internet access.
C. College campus Has multiple subdomains.
D. This answer was something about not being able to access from outside of the campus (i chose this)

4.Which command help user1 to use enable,disable,exit&etc commands?
A. catalyst1(config)#username user1 privilege 0 secret us1pass (correct)
B. catalyst1(config)#username user1 privilege 1 secret us1pass
C. catalyst1(config)#username user1 privilege 2 secret us1pass

5.Which two NAT types allows only objects or groups to reference an IP address? (choose two)
A.dynamic NAT
B.dynamic PAT
C.static NAT
D.identity NAT

(i believe the answer is A and C, if someone else knows otherwise please state it.)

ew question

December 20th, 2016

The two below were also on my test. Does anyone know the answer to 6?

  1. TCP connection (pick 2)
    A. SYN-RCVD
    B. WAIT
    C. SYN-WAIT
    D. RCVD
    E. SENT
  2. Which of the following pairs of statements is true in terms of configuring MD authentication?
    a. Interface statements (OSPF, EIGRP) must be configured; use of key chain in OSPF
    b. Router process (OSPF, EIGRP) must be configured; key chain in EIGRP
    c. Router process (only for OSPF) must be configured; key chain in EIGRP
    d. Router process (only for OSPF) must be configured; key chain in OSPF

 

The two below were also on my test. Does anyone know the answer to 6?
6. which are two valid TCP connection states (pick 2) is the gist of the question.
A. SYN-RCVD
B. WAIT
C. SYN-WAIT
D. RCVD
E. SENT

Can we all confirm that these are the new questions thus far along with the right answers?

  1. Which security term refers to a person, property, or data of value to a company?
    a. Risk
    b. Asset
    c. Threat prevention
    d. Mitigation technique

B

  1. What’s the technology that you can use to prevent non malicious program to run in the computer that is disconnected from the network?
    A. Firewall
    B. Software Antivirus
    C. Network IPS
    D. Host IPS.

D

  1. What command could you implement in the firewall to conceal internal IP address?
    No idea

4.Which statement about college campus is true?
A. College campus has geographical position.
B. College campus Hasn`t got internet access.
C. College campus Has multiple subdomains.
D.

A

5.Which firepower preprocessor block traffic based on IP?
A. Signature-Based
B. Policy-Based
C. Anomaly-Based
D. Reputation-Based

D

  1. Which command enable ospf authentication?
    A. ip ospf authentication message-digest
    B. network 192.168.10.0 0.0.0.255 area 0
    C. area 20 authentication message-digest
    D. ip ospf message-digest-key 1 md5 CCNA
    A
  2. which component of CIA triade relate to safe data which is in transit.
    A. Confidentiality
    B. Integrity
    C. Availability
    D. .

B

8.Which command help user1 to use enable,disable,exit&etc commands?
A. catalyst1(config)#username user1 privilege 0 secret us1pass
B. catalyst1(config)#username user1 privilege 1 secret us1pass
C. catalyst1(config)#username user1 privilege 2 secret us1pass
D. catalyst1(config)#username user1 privilege 5 secret us1pass

A

  1. Command ip ospf authentication key 1 is implemented in which level.
    A. Interface
    B. process
    C. global
    D. enable

A

  1. Which line in the following OSPF configuration will not be required for MD5 authentication
    to work?
    interface GigabitEthernet0/1
    ip address 192.168.10.1 255.255.255.0
    ip ospf authentication message-digest
    ip ospf message-digest-key 1 md5 CCNA
    !
    router ospf 65000
    router-id 192.168.10.1
    area 20 authentication message-digest
    network 10.1.1.0 0.0.0.255 area 10
    network 192.168.10.0 0.0.0.255 area 0
    !
    a. ip ospf authentication message-digest
    b. network 192.168.10.0 0.0.0.255 area 0
    c. area 20 authentication message-digest
    d. ip ospf message-digest-key 1 md5 CCNA

C

11 . Which of the following pairs of statements is true in terms of configuring MD authentication?
a. Interface statements (OSPF, EIGRP) must be configured; use of key chain in OSPF
b. Router process (OSPF, EIGRP) must be configured; key chain in EIGRP
c. Router process (only for OSPF) must be configured; key chain in EIGRP
d. Router process (only for OSPF) must be configured; key chain in OSPF

C

  1. Which two NAT types allows only objects or groups to reference an IP address? (choose two)
    A.dynamic NAT
    B.dynamic PAT
    C.static NAT
    D.identity NAT

AC?

  1. What port option in a PVLAN that can communicate with every other ports…
    The answer is Promiscuous..
  2. which are two valid TCP connection states (pick 2) is the gist of the question.
    A. SYN-RCVD
    B. WAIT
    C. SYN-WAIT
    D. RCVD
    E. SENT

AB?