connection?

What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?A . split tunnelingB . hairpinningC . tunnel modeD . transparent modeView AnswerAnswer: A Explanation: Split tunneling is a computer networking concept which allows a mobile user to access dissimilar security domains like a public...

October 29, 2019 No Comments READ MORE +

Which attack involves large numbers of ICMP packets with a spoofed source IP address?

Which attack involves large numbers of ICMP packets with a spoofed source IP address?A . Nuke attackB . Teardrop attackC . smurf attackD . SYN Flood attackView AnswerAnswer: C

October 29, 2019 No Comments READ MORE +

What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?

What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?A . It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January 1, 2014 and continue using the key indefinitely.B . It configures the device to begin...

October 28, 2019 No Comments READ MORE +

How many times was a read-only string used to attempt a write operation?

Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A . 9B . 6C . 4D . 3E . 2View AnswerAnswer: A Explanation: To check the status of Simple Network Management Protocol (SNMP) communications, use the show snmp command in user EXEC or...

October 27, 2019 No Comments READ MORE +

What VPN feature allows traffic to exit the security appliance through the same interface it entered?

What VPN feature allows traffic to exit the security appliance through the same interface it entered?A . hairpinningB . NATC . NAT traversalD . split tunnelingView AnswerAnswer: A Explanation: In network computing, hairpinning (or NAT loopback) describes a communication between two hosts behind the same NAT device using their mapped...

October 27, 2019 No Comments READ MORE +

In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?

In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?A . ARP spoofingB . MAC spoofingC . CAM table overflowD . DHCP spoofingView AnswerAnswer: B

October 26, 2019 No Comments READ MORE +

How is management traffic isolated on a Cisco ASR 1002?

How is management traffic isolated on a Cisco ASR 1002?A . The management interface is configured in a special VRF that provides traffic isolation from the default routing tableB . Traffic isolation is done on the VLAN levelC . There is no management traffic isolation on a Cisco ASR 1002D...

October 26, 2019 No Comments READ MORE +

Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?

Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?A . EAP-TLSB . EAP-GTCC . EAP-MSCHAPv2D . EAP-PEAPView AnswerAnswer: C

October 25, 2019 No Comments READ MORE +

What is the best definition of hairpinning?

What is the best definition of hairpinning?A . traffic that enters one interface on a device and that exits through another interfaceB . traffic that enters and exits a device through the same interfaceC . ingress traffic that traverses the outbound interface on a deviceD . traffic that tunnels through...

October 22, 2019 No Comments READ MORE +

Which mitigation technology for web-based threats prevents the removal of confidential data from the network?

Which mitigation technology for web-based threats prevents the removal of confidential data from the network?A . DLPB . CIAC . DCAD . AMPView AnswerAnswer: A

October 21, 2019 No Comments READ MORE +