What type of security support is provided by the Open Web Application Security Project?

What type of security support is provided by the Open Web Application Security Project?A . Education about common Web site vulnerabilities.B . A Web site security framework.C . A security discussion forum for Web site developers.D . Scoring of common vulnerabilities and exposures.View AnswerAnswer: A Explanation: The Open Web Application...

November 22, 2019 No Comments READ MORE +

Which two authentication types does OSPF support? (Choose two.)

Which two authentication types does OSPF support? (Choose two.)A . plaintextB . MD5C . HMACD . AES 256E . SHA-1F . DESView AnswerAnswer: A,B Explanation: These are the three different types of authentication supported by OSPF + Null Authentication-­This is also called Type 0 and it means no authentication information...

November 22, 2019 No Comments READ MORE +

What is one requirement for locking a wired or wireless device from ISE?

What is one requirement for locking a wired or wireless device from ISE?A . The ISE agent must be installed on the device.B . The device must be connected to the network when the lock command is executed.C . The user must approve the locking action.D . The organization must...

November 21, 2019 No Comments READ MORE +

According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network?

According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)A . BOOTPB . TFTPC . DNSD . MABE . HTTPF . 802.1xView AnswerAnswer: A,B,C Explanation: ACLs are...

November 21, 2019 No Comments READ MORE +

What type of algorithm uses the same key to encrypt and decrypt data?

What type of algorithm uses the same key to encrypt and decrypt data?A . a symmetric algorithmB . an asymmetric algorithmC . a Public Key Infrastructure algorithmD . an IP security algorithmView AnswerAnswer: A Explanation: A symmetric encryption algorithm, also known as a symmetrical cipher, uses the same key to...

November 19, 2019 No Comments READ MORE +

What is a possible result of this activity?

An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?A . The switch could offer fake DHCP addresses.B . The switch could become the root bridge.C . The switch could be allowed to join the VTP domain.D . The...

November 19, 2019 No Comments READ MORE +

For what reason could the image file fail to appear in the dir output?

After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?A . The secure boot-image command is configured.B . The secure boot-comfit command is...

November 19, 2019 No Comments READ MORE +

What does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?A . IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.B . ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.C . IKE version 2 security associations are established...

November 17, 2019 No Comments READ MORE +

How does a zone-based firewall implementation handle traffic between interfaces in the same zone?

How does a zone-based firewall implementation handle traffic between interfaces in the same zone?A . Traffic between two interfaces in the same zone is allowed by default.B . Traffic between interfaces in the same zone is blocked unless you configure the same-security permit command.C . Traffic between interfaces in the...

November 17, 2019 No Comments READ MORE +

What is the effect of the given command sequence?

Refer to the exhibit. What is the effect of the given command sequence?A . It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.B . It defines IPSec policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.C . It defines IKE policy for traffic...

November 17, 2019 No Comments READ MORE +