If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...
Which type of secure connectivity does an extranet provide?
Which type of secure connectivity does an extranet provide?A . other company networks to your company networkB . remote branch offices to your company networkC . your company network to the InternetD . new networks to your company networkView AnswerAnswer: A Explanation: What is an Extranet? In the simplest terms...
When is the best time to perform an anti-virus signature update?
When is the best time to perform an anti-virus signature update?A . Every time a new update is available.B . When the local scanner has detected a new virus.C . When a new virus is discovered in the wild.D . When the system detects a browser hook.View AnswerAnswer: A Explanation:...
Which tool can an attacker use to attempt a DDoS attack?
Which tool can an attacker use to attempt a DDoS attack?A . botnetB . Trojan horseC . virusD . adwareView AnswerAnswer: A Explanation: Denial-of-service (DoS) attack and distributed denial-of-service (DDoS) attack. An example is using a botnet to attack a target system. Source: Cisco Official Certification Guide, Table 1-6 Additional...
What type of algorithm uses the same key to encrypt and decrypt data?
What type of algorithm uses the same key to encrypt and decrypt data?A . a symmetric algorithmB . an asymmetric algorithmC . a Public Key Infrastructure algorithmD . an IP security algorithmView AnswerAnswer: A Explanation: A symmetric encryption algorithm, also known as a symmetrical cipher, uses the same key to...
A specific URL has been identified as containing malware.
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.A . Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list.B ....
What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)
What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)A . The Internet Key Exchange protocol establishes security associationsB . The Internet Key Exchange protocol provides data confidentialityC . The Internet Key Exchange protocol provides replay detectionD . The Internet Key Exchange protocol is responsible for...
Which two statements about stateless firewalls are true? (Choose two.)
Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPE . Cisco IOS cannot implement them because...
Which Sourcefire logging action should you choose to record the most detail about a connection?
Which Sourcefire logging action should you choose to record the most detail about a connection?A . Enable logging at the end of the session.B . Enable logging at the beginning of the session.C . Enable alerts via SNMP to log events off-box.D . Enable eStreamer to log events off-box.View AnswerAnswer:...
Which two services define cloud networks? (Choose two.)
Which two services define cloud networks? (Choose two.)A . Infrastructure as a ServiceB . Platform as a ServiceC . Security as a ServiceD . Compute as a ServiceE . Tenancy as a ServiceView AnswerAnswer: AB Explanation: The NIST's definition of cloud computing defines the service models as follows:[2] + Software...