Thursday 1 September 2016

Pass4sure 640-554 Question Answer

What is the best way to prevent a VLAN hopping attack?

A. Encapsulate trunk ports with IEEE 802.1Q.
B. Physically secure data closets.
C. Disable DTP negotiations.
D. Enable BDPU guard.

Answer: C


Which statement about PVLAN Edge is true?

A. PVLAN Edge can be configured to restrict the number of MAC addresses that appear on a single port.
B. The switch does not forward any traffic from one protected port to any other protected port.
C. By default, when a port policy error occurs, the switchport shuts down.
D. The switch only forwards traffic to ports within the same VLAN Edge.

Answer: B

Tuesday 12 July 2016

Cisco Amps Up Network Security With New Cloud System and Machine Learning Software

At the 2016 Cisco Live event, the company announced new products to address network threats faster and help users more easily pinpoint advanced threats.


At the 2016 Cisco Live event on Monday, Cisco CEO Chuck Robbins announced a new cloud policy management system and software to provide better network security for enterprise customers.

The Cisco Defense Orchestrator is a cloud-based portal that connects on-ground infrastructure and pulls it into the cloud. The Defense Orchestrator allows for security policy analysis, policy orchestration and automation, as well as monitoring and reporting to simplify policy management from the cloud.

"We've got this deployed with early customers. We find customers have different policies across their entire network," Robbins said. The Orchestrator, however, will give them consistent security management from the cloud and allow users to react to emerging threats faster.

"When you see a critical threat, you need to be able to move quickly," Robbins said.

In the morning's second announcement, Robbins said that Cisco is using advanced machine learning to detect threats. The Cisco Stealthwatch Learning Network License is a simple software upgrade that gives organizations the ability to determine where the most advanced threats are within their network, no matter how deep it goes.

"Perimeter security isn't sufficient any more," Robbins said.


The announcements were made to the more than 28,000 attendees at Cisco Live, which is being held at the Mandalay Bay Conference Center and runs through July 14. The company will touch on a variety of topics throughout the week, including IoT, drones, connected cities, and the cloud.

"A year ago I joked technology had moved from the basement to the boardroom. But now technology is fundamentally the strategy of every organization," Robbins said.

Innovation in technology has to start at the top, whether it's a CEO of a company, a mayor of a city, or the prime minister of a country, Robbins said.

"We hit an inflection point in 2015," Robbins said. "We moved through this time where we were discussing what it was, what is IoT, IoE, digitization, what is it. We've moved to a place now where every organization is trying to understand what does it mean to me, what does it mean to us, and what should we be doing in the context of all the technology that is available."

Robbins also talked about Cisco's push to acquire companies, mentioning that Cisco has already acquired more than 190 companies, and 15 of those have happened since he became CEO in May 2015. Recent acquisitions include Jasper Technologies.

"Jasper is the largest commercially-available IoT platform in the world. There are currently 31 million devices connected to Jasper. That's a good start. We're adding a million a month right now. As an example, there are 8 million connected vehicles on the Jasper platform today. This is a really important acquisition for us," Robbins said.

After an acquisition, knowing when to integrate it quickly, or keeping it separate is key. With the acquisition of Lancope, they quickly integrated it in order to hone Lancope's Stealthwatch product into the one that Cisco announced today.

"Our acquisition strategy is core. It's core to our overall innovation strategy," Robbins said.

Innovation will likely continue at Cisco, with the company spending $6 billion annually on R&D, and with $2.2 billion invested in startups around the globe, he said.

Last August, Apple and Cisco announced a strategic partnership for iOS enterprise users. At the keynote, Robbins said he's often asked what happened to that deal and for its status. He said, "Well, we went to work. We're almost ready to launch."

Apple CEO Tim Cook appeared in a video at the keynote, and mentioned the Cisco partnership, but didn't give specifics on the partnership, other than mentioning Cisco's new Spark app and how it will integrate with the iPhone and iOS 10.

As reported in ZDNet, Cisco's third quarter earnings were better than expected, with fiscal third quarter earnings of $2.3 billion, or 46 cents a share, on revenue of $12 billion. Although, that's down from $12.1 billion during the same period the previous year. Excluding the company's divested video business, sales were up 3%. Non-GAAP earnings were 57 cents a share, two cents ahead of expectations.

Thursday 9 June 2016

Pass4sure 640-554 Question Answer


Which statement describes a best practice when configuring trunking on a switch port?

A. Disable double tagging by enabling DTP on the trunk port.
B. Enable encryption on the trunk port.
C. Enable authentication and encryption on the trunk port.
D. Limit the allowed VLAN(s) on the trunk to the native VLAN only.
E. Configure an unused VLAN as the native VLAN.

Answer: E                                          


Which type of Layer 2 attack causes a switch to flood all incoming traffic to all ports?

A. MAC spoofing attack
B. CAM overflow attack
C. VLAN hopping attack
D. STP attack

Answer: B

Monday 9 May 2016

Pass4sure 640-554 Question Answer

Which item is the great majority of software vulnerabilities that have been discovered? 

A. Stack vulnerabilities
B. Heap overflows
C. Software overflows
D. Buffer overflows

Answer: D

Tuesday 5 April 2016

Pass4sure 640-554 Question Answer

Information about a managed device’s resources and activity is defined by a series of objects. What defines the structure of these management objects? 

A. MIB
B. FIB
C. LDAP
D. CEF

Answer: A                                                                  



Which statement is true about vishing? 

A. Influencing users to forward a call to a toll number (for example, a long distance or international number)
B. Influencing users to provide personal information over a web page
C. Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance or international number)
D. Influencing users to provide personal information over the phone

Answer: D

Wednesday 2 March 2016

Pass4sure 640-554 Question Answer

What Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX? 

A. Configuration interceptor
B. Network interceptor
C. File system interceptor
D. Execution space interceptor

Answer: A



Information about a managed device’s resources and activity is defined by a series of objects. What defines the structure of these management objects?

A. MIB
B. FIB
C. LDAP
D. CEF

Answer: A

Sunday 31 January 2016

Pass4sure 640-554 Question Answer

In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?

A. Roughly 50 percent
B. Roughly 66 percent
C. Roughly 75 percent
D. Roughly 10 percent

Answer: A

Which three items are Cisco best-practice recommendations for securing a network? (Choose three.)

A. Routinely apply patches to operating systems and applications.
B. Disable unneeded services and ports on hosts.
C. Deploy HIPS software on all end-user workstations.
D. Require strong passwords, and enable password expiration.

Answer: A, B, D