Friday, October 30, 2015

644-906 Implementing and Maintaining Cisco Technologies Using IOS XR - (IMTXR)

QUESTION 3
What is the maximum long-term normal operating temperature of the Cisco CRS-1, ASR 9000
Series Routers, and XR 12000 Series Routers?

A. 40C (104F)
B. 50C (122F)
C. 55C (131F)
D. 65C (149F)

Answer: A

Explanation:


QUESTION 4
The Cisco CRS 16-Slot Line Card Chassis Site Planning Guide suggests having 48 inches of
clearance behind the chassis. What would definitely happen to the system if there were only 28
inches of clearance behind the Cisco CRS 16-Slot Line Card Chassis?

A. The system would overheat due to inadequate airflow.
B. The fabric card could not be exchanged if one failed.
C. The modular services card (MSC) could not be exchanged if one failed.
D. The fan tray could not be exchanged if one failed.

Answer: D

Explanation:


QUESTION 5
How many planes are there in the Cisco CRS-3 switch fabric?

A. 1
B. 3
C. 7
D. 8

Answer: D

Explanation:


QUESTION 6
What is the cell size of the cells that traverse the switch fabric on the Cisco CRS-3?

A. 128 bytes
B. 136 bytes
C. 144 bytes
D. 200 bytes
E. 288 bytes

Answer: B

Explanation:


QUESTION 7
Where are client interfaces terminated on the Cisco CRS-3?

A. the modular services card
B. the physical layer interface module(s)
C. the switch fabric interface terminator
D. the Service Processor 40
E. the Service Processor 140

Answer: B

Explanation:


QUESTION 8
In order to determine the hardware and firmware revision of a linecard, what is the correct
command that should be invoked?

A. RP/0/RP0/CPU0:CRS-MC#show version
B. RP/0/RP0/CPU0:CRS-MC#show platform
C. RP/0/RP0/CPU0:CRS-MC(admin)#show platform
D. RP/0/RP0/CPU0:CRS-MC#show diagnostic summary
E. RP/0/RP0/CPU0:CRS-MC(admin)#show diag details

Answer: E

Explanation:


QUESTION 9
In which mode can you check the power usage of a chassis?

A. in EXEC mode
B. in admin mode
C. in both EXEC and admin mode
D. in ROMMON mode
E. in environmental mode

Answer: B

Explanation:

Wednesday, October 7, 2015

CAS-002 CompTIA Advanced Security Practitioner (CASP)


QUESTION 1
An attacker attempts to create a DoS event against the VoIP system of a company. The attacker uses a tool to flood the network with a large number of SIP INVITE traffic. Which of the following would be LEAST likely to thwart such an attack?

A. Install IDS/IPS systems on the network
B. Force all SIP communication to be encrypted
C. Create separate VLANs for voice and data traffic
D. Implement QoS parameters on the switches

Answer: D


QUESTION 2
Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?

A. The company should develop an in-house solution and keep the algorithm a secret.
B. The company should use the CEO’s encryption scheme.
C. The company should use a mixture of both systems to meet minimum standards.
D. The company should use the method recommended by other respected information security organizations.

Answer: D


QUESTION 3
A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company’s security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST?

A. Survey threat feeds from services inside the same industry.
B. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic.
C. Conduct an internal audit against industry best practices to perform a qualitative analysis.
D. Deploy a UTM solution that receives frequent updates from a trusted industry vendor.

Answer: A


QUESTION 4
An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?

A. Access control lists
B. SELinux
C. IPtables firewall
D. HIPS

Answer: B


QUESTION 5
Company XYZ has purchased and is now deploying a new HTML5 application. The company wants to hire a penetration tester to evaluate the security of the client and server components of the proprietary web application before launch. Which of the following is the penetration tester MOST likely to use while performing black box testing of the security of the company’s purchased application? (Select TWO).

A. Code review
B. Sandbox
C. Local proxy
D. Fuzzer
E. Port scanner

Answer: C,D


QUESTION 6
A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?

A. Client side input validation
B. Stored procedure
C. Encrypting credit card details
D. Regular expression matching

Answer: D