AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For Cisco- 640-554





Question ID 22153

Refer to the exhibit. Which three things occur if a user attempts to log in four times within 10 seconds using an
incorrect password? (Choose three)

Option A

Subsequent virtual login attempts from the user are blocked for 60 seconds

Option B

During the quiet mode, an administrator can virtually log in from any host on network 172.16.1.0/24

Option C

Subsequent console login attempts are blocked for 60 seconds

Option D

A message is generated indicating the username and source IP address of the user

Option E

During the quiet mode, an administrator can log in from host 172.16.1.2

Option F

No user can log in virtually from any host for 60 seconds

Correct Answer A,D,E
Explanation # login block-for attempts within Block for a_seconds with nr auth attemps failswithin b_seconds. Operates in two modes: - Normal mode (watch mode) - The router keeps count of the number of failed login attempts within an identified amount of time. - Quiet mode (quiet period) - If the number of failed logins exceeds the configured threshold, all login attempts using Telnet, SSH, and HTTP are denied. # login quiet-mode access-class Command specifies an ACL is applied to the router when switched to Quiet-Mode and identifies hosts that are exempt from the Quiet-Mode failure time. If not configured, all login requests will be denied during the Quiet-Mode.


Question ID 22154

Which statement describes configuring ACLs to control Telnet traffic destined to the router itself?

Option A

The ACL must be applied to each vty line individually

Option B

The ACL is applied to the Telnet port with the ip access-group command

Option C

Apply the ACL to the vty lines without the in or out option required when applying ACLs to interfaces

Option D

The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port

Correct Answer D
Explanation