Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 642-551 Exam - Cheat-Test.com

Free 642-551 Sample Questions:

1.Which command is used to encrypt passwords in the router configuration file?
A: service password-encryption
B: password-encryption
C: enable password encryption
D: encrypt password
Answer: A

2.What are the four critical services of IPSec functions? (Choose four.)
A:replay protection
B:confidentiality
C:data integrity
D:data mining
E:origin authentication
F:anti-replay protection
Answer: B, C, E, F

3.What are the three common types of user accounts on the Cisco IDS/IPS? (Choose three.)
A:administrator
B:guest
C:operator
D:viewer
E:privileged
F:executive
Answer: A, C, D

4.Which authentication method is based on the 802.1x authentication framework, and mitigates several of the weaknesses by using dynamic WEP and sophisticated key management on a per-packet basis?
A: PAP
B: CHAP
C: LEAP
D: ARAP
Answer: C

5.Which command sets the minimum length of all Cisco IOS passwords?
A: password min-length length
B: min-length security length
C: enable secret min-length
D: security passwords min-length length
Answer: D

6.Which command would be used on the Cisco PIX Security Appliance to show the pool of addresses to be translated?
A: show nat
B: show xlate
C: show global
D: show conn
Answer: C

7.In which version did NTP begin to support cryptographic authentication?
A: version 5
B: version 4
C: version 3
D: version 2
Answer: C

8.During which phase of an attack does the attacker attempt to identify targets?
A: penetrate
B: propagate
C: persist
D: probe
E: paralyze
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved