Drag and drop each feature that can protect against DHCP attacks from the left onto the correct description on the right.

Drag and drop each feature that can protect against DHCP attacks from the left onto the correct description on the right. View AnswerAnswer:

October 20, 2019 No Comments READ MORE +

What is a limitation of network-based IPS?

What is a limitation of network-based IPS?A . It must be individually configured to support every operating system on the networkB . It is most effective at the individual host levelC . Large installations require numerous sensors to fully protect the networkD . It is unable to monitor attacks across...

October 19, 2019 No Comments READ MORE +

Which attack can be prevented by OSPF authentication?

Which attack can be prevented by OSPF authentication?A . IP spoofing attackB . smurf attackC . denial of service attackD . buffer overflow attackView AnswerAnswer: A

October 19, 2019 1 Comment READ MORE +

Which type of malicious software can create a back-door into a device or network?

Which type of malicious software can create a back-door into a device or network?A . TrojanB . botC . wormD . virusView AnswerAnswer: A

October 19, 2019 No Comments READ MORE +

There are two versions of IKE IKEv1 and IKEv2 Both IKEv1 and IKEv2 protocols operate in phases. IKEv1 operates in two phases. IKEv2 operates in how many phases?

There are two versions of IKE IKEv1 and IKEv2 Both IKEv1 and IKEv2 protocols operate in phases. IKEv1 operates in two phases. IKEv2 operates in how many phases?A . 2B . 3C . 4D . 5View AnswerAnswer: A

October 19, 2019 No Comments READ MORE +

Which command enables port security to use sticky MAC addresses on a switch?

Which command enables port security to use sticky MAC addresses on a switch?A . switchport port-security violation protectB . switchport port-securityC . switchport port-security violation restrictD . switchport port-security mac-address stickyView AnswerAnswer: D

October 15, 2019 No Comments READ MORE +

In which three ways does the RADIUS protocol differ from TACACS? (Choose three.)

In which three ways does the RADIUS protocol differ from TACACS? (Choose three.)A . RADIUS uses UDP to communicate with the NAC . RADIUS encrypts only the password field in an authentication packet.D . RADIUS authenticates and authorizes simultaneously, causing fewer packets to be transmitted.E . RADIUS uses TCP to...

March 19, 2019 No Comments READ MORE +

What is the Cisco preferred countermeasure to mitigate CAM overflows?

What is the Cisco preferred countermeasure to mitigate CAM overflows?A . Port securityB . Dynamic port securityC . IP source guardD . Root guardView AnswerAnswer: B

March 19, 2019 No Comments READ MORE +

How does a zone-based firewall implementation handle traffic between interfaces in the same zone?

How does a zone-based firewall implementation handle traffic between interfaces in the same zone?A . Traffic between two interfaces in the same zone is allowed by default.B . Traffic between interfaces in the same zone is blocked unless you configure the same-security permit command.C . Traffic between interfaces in the...

March 19, 2019 1 Comment READ MORE +

If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two.)

If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two.)A . The user will be prompted to authenticate using the enable passwordB . Authentication attempts to the router will be deniedC . Authentication...

March 13, 2019 No Comments READ MORE +