642-542 Exam
Cisco SAFE Implementation Exam
- Exam Number/Code : 642-542
- Exam Name : Cisco SAFE Implementation Exam
- Questions and Answers : 224 Q&As
- Update Time: 2013-04-05
-
Price:
$ 119.00$ 69.00 -
642-542 Hard Copy (PDF)
-
642-542 Test Engine
Free 642-542 Demo Download
Test4pass offers free demo for CCSP 642-542 exam (Cisco SAFE Implementation Exam). You can check out the interface, question quality and usability of our practice exams before you decide to buy it. We are the only one site can offer demo for almost all products.
Exam Description
It is well known that 642-542 exam test is the hot exam of Cisco certification. Test4pass offer you all the Q&A of the 642-542 real test . It is the examination of the perfect combination and it will help you pass 642-542 exam at the first time!
Why choose Test4pass 642-542 braindumps
Quality and Value for the 642-542 Exam
100% Guarantee to Pass Your 642-542 Exam
Downloadable, Interactive 642-542 Testing engines
Verified Answers Researched by Industry Experts
Drag and Drop questions as experienced in the Actual Exams
Practice Test Questions accompanied by exhibits
Our Practice Test Questions are backed by our 100% MONEY BACK GUARANTEE.
Test4pass 642-542 Exam Features
Quality and Value for the 642-542 Exam
Test4pass Practice Exams for Cisco 642-542 are written to the highest standards of technical accuracy, using only certified subject matter experts and published authors for development.
100% Guarantee to Pass Your 642-542 Exam
If you prepare for the exam using our Test4pass testing engine, we guarantee your success in the first attempt. If you do not pass the CCSP 642-542 exam (ProCurve Secure WAN) on your first attempt we will give you a FULL REFUND of your purchasing fee AND send you another same value product for free.
Cisco 642-542 Downloadable, Printable Exams (in PDF format)
Our Exam 642-542 Preparation Material provides you everything you will need to take your 642-542 Exam. The 642-542 Exam details are researched and produced by Professional Certification Experts who are constantly using industry experience to produce precise, and logical. You may get questions from different web sites or books, but logic is the key. Our Product will help you not only pass in the first try, but also save your valuable time.
642-542 Downloadable, Interactive Testing engines
We are all well aware that a major problem in the IT industry is that there is a lack of quality study materials. Our Exam Preparation Material provides you everything you will need to take a certification examination. Like actual certification exams, our Practice Tests are in multiple-choice (MCQs) Our Cisco 642-542 Exam will provide you with free 642-542 dumps questions with verified answers that reflect the actual exam. These questions and answers provide you with the experience of taking the actual test. High quality and Value for the 642-542 Exam:100% Guarantee to Pass Your CCSP exam and get your CCSP Certification.
Hot KeyWords On 642-542 test
We collect some hot keywords about this exam:
Test4pass , Pass 4 Sure , Test in Side ,Pass Guide ,Test King 642-542 exam | 642-542 pdf exam | 642-542 braindumps | 642-542 study guides | 642-542 trainning materials | 642-542 simulations | 642-542 testing engine | 642-542 vce | 642-542 torrent | 642-542 dumps | free download 642-542 | 642-542 practice exam | 642-542 preparation files | 642-542 questions | 642-542 answers.
How to pass your 642-542 exam
You can search on Search Engine and Find Best IT Certification site: Test4pass.com - Find the Method to succeed 642-542 test,The safer.easier way to get CCSP Certification .
��
Exam : Cisco 642-542
Title : Cisco SAFE Implementation Exam
1. What is the primary identity component in a Cisco security solution?
A. Cisco VPN Concentrators
B. Cisco PIX Firewalls
C. Cisco IDS Sensors
D. Cisco Access Control servers
E. Cisco IOS Firewalls
Answer: D
2. Which are key devices in the SAFE SMR remote user network? Choose three.
A. Layer 2 switch
B. router with firewall and VPN support
C. Layer 3 switch
D. firewall with VPN support
E. NIDS
F. personal firewall software
Answer: BDF
3. Which techniques does SAFE recommend to mitigate MAC spoofing attacks? (Select two.)
A. Use port security.
B. Implement IP Source Guard feature.
C. Set all user ports to nontrunking mode.
D. Implement BPDU guard enhancement command.
E. Implement authentication for DHCP messages.
F. Use DHCP snooping along with DAI.
Answer: AF
4. The VPN acceleration module (VAM) is available on what series of VPN optimized routers? Choose two.
A. 1700 Series
B. 2600 Series
C. 3600 Series
D. 7100 Series
E. 7200 Series
Answer: DE
5. Which threats are expected in the SAFE SMR remote user network environment? Choose two.
A. trust exploitation
B. port redirection attacks
C. man in the middle attacks
D. network reconnaissance
Answer: CD
6. How does Java applet filtering distinguish between trusted and untrusted applets?
A. examines the applet for suspicious code
B. relies on a list of applets that you designate as hostile
C. relies on a list of applets that you designate as friendly
D. relies on a list of external sites that you designate as friendly
Answer: D
7. If split tunneling is disabled, how do remote users access the Internet when they have a VPN tunnel established in the software access option in the SAFE SMR remote user design environment?
A. access to the Internet is not allowed
B. the user must disable the VPN tunnel to access the Internet
C. access to the Internet is provided via the corporate connection
D. access to the Internet is provided via the ISP connection
Answer: C
8. What is the function of a crypto map on a PIX Firewall?
A. to define the policy that will be applied to the traffic
B. to specify which algorithms will be used with the selected security protocol
C. to configure a pre-shared authentication key and associate the key with an IPSec peer address or host name
D. to map transforms to transform sets
Answer: A
9. What does CBAC dynamically create and delete?
A. TCP sessions
B. crypto maps
C. access control lists
D. security control lists
Answer: C
10. What is not a specific type of attack, but refers to most attacks that occur today?
A. DoS
B. brute force password
C. IP spoofing
D. unauthorized access
Answer: D
11. What are three steps of the Security Wheel? Choose three.
A. improve
B. log
C. maintain
D. test
E. secure
F. report
Answer: ADE
12. Which command implements Unicast RPF IP spoofing protection?
A. access-list
B. access-group
C. ip verify reverse-path interface
D. tcp verify reverse-path interface
E. udp verify reverse-path interface
Answer: C
13. How are packet sniffer attacks mitigated in the SAFE SMR small network corporate Internet module?
A. RFC 2827 and 1918 filtering at ISP edge and local firewall
B. switched infrastructure and HIDS
C. protocol filtering
D. restrictive trust model and private VLANs
E. restrictive filtering and HIDS
Answer: B
14. Which model is recommended for an IDS with at least 100 Mbps performance?
A. 4210
B. 4220
C. 4250
D. 4260
Answer: C