Home Page > Cisco > 200-120

Download Cisco.Lead2pass.200-120.v2013-07-29.by.Spike.268q.vce

Exam: CCNA Cisco Certified Network Associate CCNA (803)
Size: 14.19 MB
Posted: 2013-07-29
Votes: 3
Download: Cisco.Lead2pass.200-120.v2013-07-29.by.Spike.268q.vce

Vote For This File

Verification:*
Type the characters from the picture.

Comments

* The most recent comments are at the top.

    • CGT from Germany 09 21 2013, 2:46 PM Report Spam
      @Sunil

      ahahaha :D

      very funny your question …
      Makes no sense to learn only questions and answers …
      Better is to understand what you are reading to be worth being a CCNA
      Many questions and sims are very similar to the dumps.
      But you should know how to calculate IP's and subnetting, also should read all questions very careful.
      Best wishes to all candidates

    • Rich S. from United States 09 20 2013, 3:23 PM Report Spam
      Shouldn't question FQ33 be choice B 3 interfaces? It is only the nat inside command, not outside, which is what should be configured on the 4th interface.
    • Frank Dupuis from Canada 09 17 2013, 11:58 PM Report Spam
      Good work Kraven! Much appreciated!
    • khan from Pakistan 09 17 2013, 11:32 PM Report Spam
      Thanks kraven
    • Kraven from United States 09 17 2013, 12:06 PM Report Spam
      @Khan you are the man. I thought the answer I got from Todd Lammle book was good but I would rather go with your answer and explanation as it is coming from Cisco press.
    • khan from Pakistan 09 17 2013, 11:35 AM Report Spam
      A34 Which two data integrity algorithms are commonly used in VPN solutions? (Choose two)
      correct answer is HMAC-SHA-1 & HMAC-MD5

      Reference:
      Describe the two HMAC algorithms that are commonly used today to provide data integrity.

      Answer: The two HMAC algorithms that are commonly used today to provide data integrity are as follows:

      HMAC-MD5 This protocol uses a 128-bit shared key. The key and the message combine to form a 128-bit hash.
      HMAC-SHA-1 This protocol uses a 160-bit shared key. The length of the hash is 160 bits, so this protocol is considered stronger because of the longer key.

      Chapter 12. Virtual Private Networks

      Network Security Fundamentals
      By Gert De Laet, Gert Schauwers

      Publisher : Cisco Press
      http://ciscosecurity.org.ua/1587051672/app04lev1sec12.html#ch12qa1q3a1

      RSA is not a data integrity algorithm. The following explanation is NOT correct

      "Data Integrity HMAC-SHA-1 and RSA aer two data integrity algorithms that are commonly used in VPN solutions. HMAC-SHA-1 provides hasing of the data to verify the data was not altered along the way, and RSA provides hasing of the data to verify the data was not altered along the way, and RSA provides encrypted key exchange between two peers so that each host has the key to unencrypt the data when received."
      =====================================================
      A47 Incomplete question statement: Host A pings interface S0/0 on router 3. What is the TTL value for that ping?
      it should be
      HostA pings interface S0/0 on Router3, what will be the TTL value for that ping before it enter Router3?
      ====================
      F56 part of the question is missing. correct question is
      HostA pings interface S0/0 on Router3, what will be the TTL value for that ping before it enters Router3?
      ==============
      G22 Typo

    • khan from Pakistan 09 17 2013, 11:35 AM Report Spam
      F32 Which component of VPN technology ensures that data can be read only by its intended recipient?
      correct answer is encryption.
      The Question is:
      Which component of VPN technology ensures that data can be READ ONLY by its intended recipient?

      To make sure I communicate with the intended recipient I have to authenticate the recipient, but this doesn’t prevent others, who are able to sniff the communication to READ the data if it is send in cleartext.

      Which component of VPN technology ensures that data can be READ only by its intended recipient?

      Authentication basically is to validate that the other end is genuinely the person that you initially wanted to exchange data with.

      Now, I believe the question is asking about data confidentiality, as to who can actually read your data. Now, considering encryption, we will consider both scenarios – symmetric encryption {where we have the same shared secret key on both sides; we encrypt data using this shared secret key and send it over to the other side} and asymmetric key encryption {where the key used to encrypt data differs from and is complementary to the key used to decrypt data; we exchange public keys, encrypt data using public keys and send over the encrypted data over to the other side}.

      Now be it symmetric or asymmetric encryption, only the other side has the appropriate key(same key in case of symm encryption and the private key in case of asymm encryption) to decrypt data. Anybody in between can launch a Man-In-The-Middle attack and probably sniff packets but all he will see is gibberish, which is useless to him and presents no way for him to actually READ the data.
      ============================

    • khan from Pakistan 09 17 2013, 11:34 AM Report Spam
      Errors in this dump

      A9 (actually the question looks wrong) see CliffsTestPrep Cisco CCNA By Todd Lammle pg 85
      =========================================
      A38
      correct answer is “service timestamps debug datetime msec”
      "The service timestamps command is used to configure the system to apply a time stamp to debugging messages or system logging messages. If the service timestamps command is specified with no arguments or keywords, the default is service timestamps debug uptime.

      The “service timestamps debug datetime msec” command tells the device to indicate time-stamping for system logging messages in the format of MMM DD HH:MM:SS.mmm (Month, date, hour, minute, second, millisecond corresponding). For example: 09 1 06:45:26.523.

      Note: Answer A “service timestamps log datetime msec” is used for logging messages, not debugging messages.

      (Reference: http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_r1.html#wp1030116)"
      ===================================

    • ABEL from Spain 09 17 2013, 10:29 AM Report Spam
      Exam B, Q58

      Which port state is introduced by Rapid-PVST?

      Learning
      Listening
      Discarding
      Forwarding

      Correct answer is A & D???????

    • khan from Pakistan 09 17 2013, 6:58 AM Report Spam
    • Sunil from India 09 17 2013, 2:16 AM Report Spam
      @CGT

      This dump was uploaded yesterday only. You studied and passed and verified in one single day? That was so believable. LOL. Dont fool yourself.

    • khan from Pakistan 09 16 2013, 10:34 PM Report Spam
      @kraven

      A34 Which two data integrity algorithms are commonly used in VPN solutions? (Choose two)
      correct answer is HMAC-SHA-1 & HMAC-MD5

      Describe the two HMAC algorithms that are commonly used today to provide data integrity.

      Answer: The two HMAC algorithms that are commonly used today to provide data integrity are as follows:

      HMAC-MD5 This protocol uses a 128-bit shared key. The key and the message combine to form a 128-bit hash.
      HMAC-SHA-1 This protocol uses a 160-bit shared key. The length of the hash is 160 bits, so this protocol is considered stronger because of the longer key.

      Chapter 12. Virtual Private Networks

      Network Security Fundamentals
      By Gert De Laet, Gert Schauwers

      Publisher : Cisco Press
      http://ciscosecurity.org.ua/1587051672/app04lev1sec12.html#ch12qa1q3a1

      RSA is not a data integrity algorithm.

    • Brownie from Canada 09 16 2013, 10:34 PM Report Spam
      Is there a trick to getting the simulations to work using VCE ? I can't access the consoles in the question, hence I can't access info needed to answer the questions.
    • BIM from Israel 09 16 2013, 5:27 PM Report Spam
      Hi,
      I have tommrow the exam ccna 640-802 , if someone have tips i will happy …
      thanks , And this dump all question on exam ?
    • zdenek from Czech Republic 09 16 2013, 1:30 PM Report Spam
      Exam C, Q71
      Shouldn't A and E be correct? Even if answer is saying router C will send destination unreachable D is mentioned as correct answer.
    • Kraven from United States 09 16 2013, 12:31 PM Report Spam
      ************Please Read**************
      This dump is an updated version of Spike 670 with corrections and explanation to the following sections:
      Basic Operation Questions
      How a Network Works
      IP Services
      IPv6
      Layer 2 Security
      Layer 3 Security
      Spanning Tree….>>>Newest section with corrections
    • dave from Unknown 09 16 2013, 12:06 PM Report Spam
      @CGT how many do u think are from here..,can i pass just with these.,.and "?" key works there or not..?
    • CGT from Unknown 09 16 2013, 11:19 AM Report Spam
      Passed today the 640-802 with score 974

      All thanks to 9tut, Spike, Kraven .. many questions are in the dumps and sim
      (Eigrp, ACL2, VTP)

Close

Site Search:

Site Search:

Terms of Service

Proudly powered by www.iexamcollection.com