Which term refers to the electromagnetic interference that can radiate from network cables?
Which term refers to the electromagnetic interference that can radiate from network cables?A . multimode distortionB . EmanationsC . Doppler wavesD . Gaussian distributionsView AnswerAnswer: B
What action can you take to allow the user access to the IP address?
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?A . Create a whitelist...
Which FirePOWER preprocessor engine is used to prevent SYN attacks?
Which FirePOWER preprocessor engine is used to prevent SYN attacks?A . Rate-Based PreventionB . Portscan DetectionC . IP DefragmentationD . Inline NormalizationView AnswerAnswer: A Explanation: Rate-based attack prevention identifies abnormal traffic patterns and attempts to minimize the impact of that traffic on legitimate requests. Rate-based attacks usually have one of...
What is the purpose of the Integrity component of the CIA triad?
What is the purpose of the Integrity component of the CIA triad?A . to ensure that only authorized parties can modify dataB . to determine whether data is relevantC . to create a process for accessing dataD . to ensure that only authorized parties can view dataView AnswerAnswer: A Explanation:...
What are two default Cisco IOS privilege levels? (Choose two.)
What are two default Cisco IOS privilege levels? (Choose two.)A . 0B . 1C . 5D . 7E . 10F . 15View AnswerAnswer: B,F Explanation: By default, the Cisco IOS software command-line interface (CLI) has two levels of access to commands: user EXEC mode (level 1) and privileged EXEC mode...
does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPsec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPsec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPsec Phase 1 is down due to...
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...
What is an advantage of split tunneling?
What is an advantage of split tunneling?A . It enables the VPN server to filter traffic more efficientlyB . It protects traffic on the private network from users on the public networkC . It allows users with a VPN connection to a corporate network to access the Internet by using...
What type of firewall would use the given configuration line?
Refer to the exhibit. What type of firewall would use the given configuration line? A. a stateful firewall B. a personal firewall C. a proxy firewall D. an application firewall E. a stateless firewallView AnswerAnswer: A Explanation: The output is from "show conn" command on an ASA. This is another...
In a security context, which action can you take to address compliance?
In a security context, which action can you take to address compliance?A . Implement rules to prevent a vulnerability.B . Correct or counteract a vulnerability.C . Reduce the severity of a vulnerability.D . Follow directions from the security appliance manufacturer to remediate a vulnerability.View AnswerAnswer: A Explanation: In general, compliance...