Which term refers to the electromagnetic interference that can radiate from network cables?

Which term refers to the electromagnetic interference that can radiate from network cables?A . multimode distortionB . EmanationsC . Doppler wavesD . Gaussian distributionsView AnswerAnswer: B

November 10, 2019 No Comments READ MORE +

What action can you take to allow the user access to the IP address?

You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?A . Create a whitelist...

November 10, 2019 No Comments READ MORE +

Which FirePOWER preprocessor engine is used to prevent SYN attacks?

Which FirePOWER preprocessor engine is used to prevent SYN attacks?A . Rate-Based PreventionB . Portscan DetectionC . IP DefragmentationD . Inline NormalizationView AnswerAnswer: A Explanation: Rate-based attack prevention identifies abnormal traffic patterns and attempts to minimize the impact of that traffic on legitimate requests. Rate-based attacks usually have one of...

November 10, 2019 No Comments READ MORE +

What is the purpose of the Integrity component of the CIA triad?

What is the purpose of the Integrity component of the CIA triad?A . to ensure that only authorized parties can modify dataB . to determine whether data is relevantC . to create a process for accessing dataD . to ensure that only authorized parties can view dataView AnswerAnswer: A Explanation:...

November 10, 2019 No Comments READ MORE +

What are two default Cisco IOS privilege levels? (Choose two.)

What are two default Cisco IOS privilege levels? (Choose two.)A . 0B . 1C . 5D . 7E . 10F . 15View AnswerAnswer: B,F Explanation: By default, the Cisco IOS software command-line interface (CLI) has two levels of access to commands: user EXEC mode (level 1) and privileged EXEC mode...

November 10, 2019 No Comments READ MORE +

does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPsec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPsec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPsec Phase 1 is down due to...

November 9, 2019 No Comments READ MORE +

If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?

If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...

November 9, 2019 No Comments READ MORE +

What is an advantage of split tunneling?

What is an advantage of split tunneling?A . It enables the VPN server to filter traffic more efficientlyB . It protects traffic on the private network from users on the public networkC . It allows users with a VPN connection to a corporate network to access the Internet by using...

November 9, 2019 No Comments READ MORE +

What type of firewall would use the given configuration line?

Refer to the exhibit. What type of firewall would use the given configuration line? A. a stateful firewall B. a personal firewall C. a proxy firewall D. an application firewall E. a stateless firewallView AnswerAnswer: A Explanation: The output is from "show conn" command on an ASA. This is another...

November 9, 2019 No Comments READ MORE +

In a security context, which action can you take to address compliance?

In a security context, which action can you take to address compliance?A . Implement rules to prevent a vulnerability.B . Correct or counteract a vulnerability.C . Reduce the severity of a vulnerability.D . Follow directions from the security appliance manufacturer to remediate a vulnerability.View AnswerAnswer: A Explanation: In general, compliance...

November 8, 2019 No Comments READ MORE +