Skip to main content

Posts

Showing posts from April 14, 2009

CCNA v4 - E4 - Module 4 (100%)

http://p4s-ccna.blogspot.com http://testccna-4u.blogspot.com 1. What is the best defense for protecting a network from phishing exploits?    Schedule training for all users. 2. What are three characteristics of a good security policy? (Choose three.)    It defines acceptable and unacceptable use of network resources.    It communicates consensus and defines roles.    It defines how to handle security incidents. 3. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)    The software is version 12.1, 4th revision.    The IOS is for the Cisco 2600 series hardware platform. 4. Refer to the exhibit. What is accomplished when both commands are configured on the router?    The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities. 5. Which two conditions should the network administrator verify