If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?

If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...

December 29, 2019 No Comments READ MORE +

Which type of secure connectivity does an extranet provide?

Which type of secure connectivity does an extranet provide?A . other company networks to your company networkB . remote branch offices to your company networkC . your company network to the InternetD . new networks to your company networkView AnswerAnswer: A Explanation: What is an Extranet? In the simplest terms...

December 29, 2019 No Comments READ MORE +

When is the best time to perform an anti-virus signature update?

When is the best time to perform an anti-virus signature update?A . Every time a new update is available.B . When the local scanner has detected a new virus.C . When a new virus is discovered in the wild.D . When the system detects a browser hook.View AnswerAnswer: A Explanation:...

December 29, 2019 No Comments READ MORE +

Which tool can an attacker use to attempt a DDoS attack?

Which tool can an attacker use to attempt a DDoS attack?A . botnetB . Trojan horseC . virusD . adwareView AnswerAnswer: A Explanation: Denial-of-service (DoS) attack and distributed denial-of-service (DDoS) attack. An example is using a botnet to attack a target system. Source: Cisco Official Certification Guide, Table 1-6 Additional...

December 29, 2019 No Comments READ MORE +

What type of algorithm uses the same key to encrypt and decrypt data?

What type of algorithm uses the same key to encrypt and decrypt data?A . a symmetric algorithmB . an asymmetric algorithmC . a Public Key Infrastructure algorithmD . an IP security algorithmView AnswerAnswer: A Explanation: A symmetric encryption algorithm, also known as a symmetrical cipher, uses the same key to...

December 28, 2019 No Comments READ MORE +

A specific URL has been identified as containing malware.

A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.A . Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list.B ....

December 28, 2019 No Comments READ MORE +

What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)

What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)A . The Internet Key Exchange protocol establishes security associationsB . The Internet Key Exchange protocol provides data confidentialityC . The Internet Key Exchange protocol provides replay detectionD . The Internet Key Exchange protocol is responsible for...

December 28, 2019 No Comments READ MORE +

Which two statements about stateless firewalls are true? (Choose two.)

Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPE . Cisco IOS cannot implement them because...

November 25, 2019 No Comments READ MORE +

Which Sourcefire logging action should you choose to record the most detail about a connection?

Which Sourcefire logging action should you choose to record the most detail about a connection?A . Enable logging at the end of the session.B . Enable logging at the beginning of the session.C . Enable alerts via SNMP to log events off-box.D . Enable eStreamer to log events off-box.View AnswerAnswer:...

November 25, 2019 No Comments READ MORE +

Which two services define cloud networks? (Choose two.)

Which two services define cloud networks? (Choose two.)A . Infrastructure as a ServiceB . Platform as a ServiceC . Security as a ServiceD . Compute as a ServiceE . Tenancy as a ServiceView AnswerAnswer: AB Explanation: The NIST's definition of cloud computing defines the service models as follows:[2] + Software...

November 25, 2019 No Comments READ MORE +