Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following SCNS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

SCNS Exam Dumps - SCNS Tactical Perimeter Defense

Go to page:
Question # 33

You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.

Router(config)#access-list 64 deny 10.10.11.0 0.0.0.255

Router(config)#access-list 64 deny 10.10.12.0 0.0.0.255

Router(config)#interface Ethernet 0

Router(config-if)#ip access-group 64 out

Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.

A.

Deny network 10.10.11.0 from access to network 10.10.12.0

B.

Deny network 10.10.12.0 from access to network 10.10.11.0

C.

Deny network 10.10.11.0 from access to network 10.10.10.0

D.

Deny network 10.10.12.0 from access to network 10.10.10.0

E.

Deny all outgoing traffic on E0

Full Access
Question # 34

You have decided to implement SSH for communicating to your router. What does SSH use to establish a secure channel of communication?

A.

RSA Public Key Cryptography

B.

DES Public Key Cryptography

C.

MD5 Private Key Cryptography

D.

MD5 Public Key Cryptography

E.

RSA Private Key Cryptography

Full Access
Go to page: