How does a zone-based firewall implementation handle traffic between interfaces in the same zone?
How does a zone-based firewall implementation handle traffic between interfaces in the same zone?A . Traffic between two interfaces in the same zone is allowed by default.B . Traffic between interfaces in the same zone is blocked unless you configure the same-security permit command.C . Traffic between interfaces in the...
For what reason could the image file fail to appear in the dir output?
After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?A . The secure boot-image command is configured.B . The secure boot-comfit command is...
How many crypto map sets can you apply to a router interface?
How many crypto map sets can you apply to a router interface?A . 3B . 2C . 4D . 1View AnswerAnswer: D Explanation: You must assign a crypto map set to an interface before that interface can provide IPSec services. Only one crypto map set can be assigned to an...
Which two authentication types does OSPF support? (Choose two.)
Which two authentication types does OSPF support? (Choose two.)A . plaintextB . MD5C . HMACD . AES 256E . SHA-1F . DESView AnswerAnswer: A,B Explanation: These are the three different types of authentication supported by OSPF + Null Authentication-This is also called Type 0 and it means no authentication information...
Which security zone is automatically defined by the system?
Which security zone is automatically defined by the system?A . The source zoneB . The self zoneC . The destination zoneD . The inside zoneView AnswerAnswer: B Explanation: A zone is a logical area where devices with similar trust levels reside. For example, we could define a DMZ for devices...
What is an advantage of placing an IPS on the inside of a network?
What is an advantage of placing an IPS on the inside of a network?A . It can provide higher throughput.B . It receives traffic that has already been filtered.C . It receives every inbound packet.D . It can provide greater security.View AnswerAnswer: B Explanation: Firewalls are generally designed to be...
What two solutions can you use?
You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two).A . Configure a proxy server to hide users' local IP addresses.B . Assign unique IP addresses...
What is the effect of the given command sequence?
Refer to the exhibit. What is the effect of the given command sequence?A . It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.B . It defines IPSec policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.C . It defines IKE policy for traffic...
What type of security support is provided by the Open Web Application Security Project?
What type of security support is provided by the Open Web Application Security Project?A . Education about common Web site vulnerabilities.B . A Web site security framework.C . A security discussion forum for Web site developers.D . Scoring of common vulnerabilities and exposures.View AnswerAnswer: A Explanation: The Open Web Application...
What is the purpose of a honeypot IPS?
What is the purpose of a honeypot IPS?A . To create customized policiesB . To detect unknown attacksC . To normalize streamsD . To collect information about attacksView AnswerAnswer: D Explanation: Honeypot systems use a dummy server to attract attacks. The purpose of the honeypot approach is to distract attacks...