CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/
CCNA 2 Chapter 8 V4.0
Labels: CCNA 2 Chapter 8 V4.0
1
Which AAA service reduces IT operating costs by providing detailed reporting and
monitoring of network user behavior, and also by keeping a record of every access
connection and device configuration change across the network?
authentication
accreditation
*accounting
authorization
2
Which three items are normally included when a log message is generated by a syslog
client and forwarded to a syslog server? (Choose three.)
*date and time of message
*ID of sending device
length of message
*message ID
checksum field
community ID
3
What is the advantage of using WPA to secure a wireless network?
*It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless
access.
It uses an advanced encryption key that is never transmitted between host and access
point.
It is supported on older wireless hardware, thus providing maximum compatibility
with enterprise equipment.
It requires the MAC address of a network device that is requesting wireless access to
be on a list of approved MAC addresses.
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/
4
A company wants to configure a firewall to monitor all channels of communication
and allow only traffic that is part of a known connection. Which firewall
configuration should be deployed?
*packet filtering
proxy
stateful packet inspection
stateless packet inspection
5
A server log includes this entry: User student accessed host server ABC using Telnet
yesterday for 10 minutes. What type of log entry is this?
authentication
authorization
*accounting
accessing
6
What two measures help to verify that server backups have been reliably completed?
(Choose two.)
*reviewing backup logs
*performing trial backups
performing full backups only
replacing tape backup with hard disk-based