1. What is the function of the kernel of an operating software? It provides a user interface that allows users to request a specific task. The kernel links the hardware drivers with the underlying electronics of a computer. It is an application that allows the initial configuration of …
1. A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.) better security easy to create* better device performance when acting as both client and server lacks centralized administration* less cost to implement* scalable 2. …
CCNA 1 v6.0 Pretest Exam Answers 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101 11101110 2. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list …
1. Which security test is appropriate for detecting system weaknesses such as misconfiguration, default passwords, and potential DoS targets? vulnerability scanning* network scanning integrity checkers penetration testing 2. How does network scanning help assess operations security? It can simulate attacks from malicious sources. It can log abnormal …
1. Which statement describes the function provided to a network administratorwho uses the Cisco Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start application? The administrator can connect to and manage a single ASA.* The administrator can connect to and manage multiple ASA devices. …
CCNA Security 2.0 PT Practice SA – Part 1 A few things to keep in mind while completing this activity: Do not use the browser Back button or close or reload any exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. …
1. Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario …
1. Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router? It will be sent unencrypted.* It will be sent encrypted. It will be blocked. It will be discarded. 2. What three protocols must be …
1. What is the focus of cryptanalysis? hiding secret codes developing secret codes breaking encrypted codes* implementing encrypted codes 2. How many bits does the Data Encryption Standard (DES) use for data encryption? 40 bits 56 bits* 64 bits 72 bits 3. Which statement describes the …
1. Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? The connection between S1 and PC1 is via a crossover …