Which type of NAT would you configure if a host on the external network required access to an internal host?
A. outside global NAT
B. NAT overload
C. dynamic outside NAT
D. static NAT
Which two features are supported by Cisco IronPort Security Gateway? (Choose two.)
A. spam protection
B. outbreak intelligence
C. HTTP and HTTPS scanning
D. email encryption
E. DDoS protection
Which option is a feature of Cisco ScanSafe technology?
A. spam protection
B. consistent cloud-based policy
C. DDoS protection
D. RSA Email DLP
Which two characteristics represent a blended threat? (Choose two.)
A. man-in-the-middle attack
B. trojan horse attack
C. pharming attack
D. denial of service attack
E. day zero attack
Under which higher-level policy is a VPN security policy categorized?
A. application policy
B. DLP policy
C. remote access policy
D. compliance policy
E. corporate WAN policy
What does level 5 in this enable secret global configuration mode command indicate?
A. router#enable secret level 5 password
B. The enable secret password is hashed using MD5.
C. The enable secret password is hashed using SHA.
D. The enable secret password is encrypted using Cisco proprietary level 5 encryption.
E. Set the enable secret command to privilege level 5.
F. The enable secret password is for accessing exec privilege level 5.
Which Cisco management tool provides the ability to centrally provision all aspects of device configuration across the Cisco family of security products?
A. Cisco Configuration Professional
B. Security Device Manager
C. Cisco Security Manager
D. Cisco Secure Management Server
Which option is the correct representation of the IPv6 address 2001:0000:150C:0000:0000:41B1:45A3:041D?
Which three options are common examples of AAA implementation on Cisco routers? (Choose
A. authenticating remote users who are accessing the corporate LAN through IPsec VPN connections
B. authenticating administrator access to the router console port, auxiliary port, and vty ports
C. implementing PKI to authenticate and authorize IPsec VPN peers using digital certificates
D. tracking Cisco NetFlow accounting statistics
E. securing the router by locking down all unused services
F. performing router commands authorization using TACACS+
When AAA login authentication is configured on Cisco routers, which two authentication methods should be used as the final method to ensure that the administrator can still log in to the router in case the external AAA server fails? (Choose two.)
A. group RADIUS
B. group TACACS+
Share The Latest Real Cisco 640-554 Exam Questions And Answers From PassLeader