PrepAway - Latest Free Exam Questions & Answers

Category: 640-553

Cisco Certified Network Associate Security (CCNA® Security)

which one offers a variety of security solutions, including firewall, IPS, VPN, antispyware, antivirus, and an

Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN, antispyware, antivirus, and antiphishing features? A. Cisco 4200 series IPS appliance B. Cisco ASA 5500 series security appliance C. Cisco IOS router D. Cisco PIX 500 series security appliance Explanation/Reference: The Cisco advances in firewall technologies include the acquisition […]

What is the reason that Cisco still support the use of both enable secret and enable passwords in a routerR

The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enable password is not hashed (or encrypted, if the password-encryption service is not enabled). What is the reason that Cisco still support the use of both enable secret and enable passwords in a router’s configuration? A. The enable password […]

How does CLI view differ from a privilege level?

How does CLI view differ from a privilege level? A. A CLI view supports only commands configured for that specific view, whereas a privilege level supports commands available to that level and all the lower levels. B. A CLI view supports only monitoring commands, whereas a privilege level allows a user to make changes to […]

Which is the main difference between host-based and network-based intrusion prevention?

Which is the main difference between host-based and network-based intrusion prevention? A. Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows. B. Host-based IPS can work in promiscuous mode or inline mode. C. Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on […]

Which one is the most important based on the following common elements of a network design?

Which one is the most important based on the following common elements of a network design? A. Business needs B. Best practices C. Risk analysis D. Security policy Explanation/Reference: A common temptation when designing a security solution for a network is to make the network so secure that it cannot easily be used for its […]

which one is to ensure that no one employee becomes a pervasive security threat, that data can be recovered fr

For the following attempts, which one is to ensure that no one employee becomes a pervasive security threat, that data can be recovered from backups, and that information system changes do not compromise a system’s security? A. Disaster recovery B. Strategic security planning C. Implementation security D. Operations security

which one accurately matches the CLI command(s) to the equivalent SDM wizard that performs similar configurati

For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM wizard that performs similar configuration functions? A. setup exec command and the SDM Security Audit wizard B. auto secure exec command and the SDM One-Step Lockdown wizard C. aaa configuration commands and the SDM Basic Firewall wizard D. Cisco Common […]

Which three options are network evaluation techniques?

Which three options are network evaluation techniques? (Choose three.) A. Scanning a network for active IP addresses and open ports on those IP addresses B. Using password-cracking utilities C. Performing end-user training on the use of antispyware software D. Performing virus scans


Page 15 of 17« First...10...1314151617