Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 642-542 Exam -

Free 642-542 Sample Questions:

1.What is the definition of a strong password?
A. at least eight characters long; contains uppercase letters, lowercase letters, numbers, and special characters
B. at least ten characters long and should contain cryptographic characters
C. at least eight characters long; contains uppercase letters, lowercase letters, numbers, and should not contain special characters
D. defined by each company depending on the product being used
Answer: A

2.When allowing syslog access from devices outside a firewall, what filtering at the perimeter router should you implement?
A. no filtering should be implemented since it will block the syslog traffic
B. RFC 1918
C. RFC 2827
D. RFC 1281
E. RFC 1642
Answer: C

3.Which type of attack is characterized by exploitation of well-known weaknesses, use of ports that are allowed through a firewall, and can never be completely eliminated?
A. network reconnaissance
B. application layer
C. man-in-the-middle
D. trust exploitation
Answer: B

4.What are two characteristics of a packet sniffer designed for attack purposes? Choose two.
A. captures first 300 to 400 bytes
B. typically captures login sessions
C. captures the last 300 to 400 bytes
D. deciphers encrypted passwords
E. unable to capture UDP packets
Answer: A, B

5.Which two general IP spoofing techniques does a hacker use? Choose two.
A. an IP address within the range of trusted IP addresses
B. an unknown IP address which cannot be traced
C. an RFC 1918 address
D. an authorized external IP address that is trusted
Answer: A, D

5.What method helps mitigate the threat of IP spoofing?
A. access control
B. logging
C. SNMP polling
D. Layer 2 switching
Answer: A

6.Which method will always compute the password if it is made up of the character set you selected to test?
A. brute force computation
B. strong password computation
C. password reassemble
D. brute force mechanism
Answer: A

7.Which type of attack is usually implemented using packet sniffers?
A. man-in-the-middle
B. DoS
C. brute force
D. IP spoofing
Answer: A

8.What is an example of a trust model?
Answer: B

9.What is the primary method of mitigating port redirection attacks? A. keep firewalls up to date with the latest patches and fixes
B. do not allow trust models
C. keep OS and applications up to date with the latest patches and fixes
D. use proper trust models
Answer: D

10.What is not a specific type of attack, but refers to most attacks that occur today?
A. DoS
B. brute force password
C. IP spoofing
D. unauthorized access
Answer: D

© 2014, All Rights Reserved