640-554 IINS Online Test-Implementing Cisco IOS Network Security (IINS)

At present, Our 640-554 IINS online test are the perfect way to brush up your skills, Take our 640-554 IINS online test for a run-through of commonly asked questions. You will get incredibly detailed scoring results at the end of your 640-554 IINS online test to help you identify your strenghts and weaknesses.

Our 640-554 IINS online test only offer 20 questions, it contains single choice and multiple choice,5 points for questions you get correct ,if you answer correctly part of multiple choice, you can get part of 5 points.

Begin to test now !

Which Cisco IOS command will verify authentication between a router and a AAA server?

 
 
 
 

Which AAA feature can automate record keeping within a network?

 
 
 
 

Which two statements about IPv6 access lists are true? (Choose two)

 
 
 
 
 

Which command enables subnet 192.168.8.4/30 to communicate with subnet 192.168.8.32/27 on IP protocol 50?

 
 
 
 

Which two types of access lists can be used for sequencing? (Choose two.)

 
 
 
 

Which command will block IP traffic to the destination 172.16.0.1/32?

 
 
 
 

Which two considerations about secure network monitoring are important? (Choose two.)

 
 
 
 
 
 

Which two countermeasures can mitigate STP root bridge attacks? (Choose two.)

 
 
 
 

Which two countermeasures can mitigate MAC spoofing attacks? (Choose two.)

 
 
 
 

Which statement correctly describes the function of a private VLAN?

 
 
 
 

What are two primary attack methods of VLAN hopping? (Choose two.)

 
 
 
 

Which type of attack can be prevented by setting the native VLAN to an unused VLAN?

 
 
 
 

What is the purpose of a trunk port?

 
 
 
 

The host A Layer 2 port is configured in VLAN 5 on switch 1, and the host B Layer 2 port is configured in VLAN 10 on switch 1.
Which two actions you can take to enable the two hosts to communicate with each other? (Choose two.)

 
 
 
 

Which two pieces of information should you acquire before you troubleshoot an STP loop? (Choose two.)

 
 
 
 

Which two options are symmetric-key algorithms that are recommended by Cisco? (Choose two.)

 
 
 
 

Which technology provides an automated digital certificate management system for use with IPsec?

 
 
 
 

Which two IPsec protocols are used to protect data in motion? (Choose two.)

 
 
 
 

On which protocol number does Encapsulating Security Payload operate?

 
 
 
 

On which protocol number does the authentication header operate?

 
 
 
 

Question 1 of 20

 

buy