Drag and drop each feature that can protect against DHCP attacks from the left onto the correct description on the right.
Drag and drop each feature that can protect against DHCP attacks from the left onto the correct description on the right. View AnswerAnswer:
What is a limitation of network-based IPS?
What is a limitation of network-based IPS?A . It must be individually configured to support every operating system on the networkB . It is most effective at the individual host levelC . Large installations require numerous sensors to fully protect the networkD . It is unable to monitor attacks across...
Which attack can be prevented by OSPF authentication?
Which attack can be prevented by OSPF authentication?A . IP spoofing attackB . smurf attackC . denial of service attackD . buffer overflow attackView AnswerAnswer: A
Which type of malicious software can create a back-door into a device or network?
Which type of malicious software can create a back-door into a device or network?A . TrojanB . botC . wormD . virusView AnswerAnswer: A
There are two versions of IKE IKEv1 and IKEv2 Both IKEv1 and IKEv2 protocols operate in phases. IKEv1 operates in two phases. IKEv2 operates in how many phases?
There are two versions of IKE IKEv1 and IKEv2 Both IKEv1 and IKEv2 protocols operate in phases. IKEv1 operates in two phases. IKEv2 operates in how many phases?A . 2B . 3C . 4D . 5View AnswerAnswer: A
Which command enables port security to use sticky MAC addresses on a switch?
Which command enables port security to use sticky MAC addresses on a switch?A . switchport port-security violation protectB . switchport port-securityC . switchport port-security violation restrictD . switchport port-security mac-address stickyView AnswerAnswer: D
In which three ways does the RADIUS protocol differ from TACACS? (Choose three.)
In which three ways does the RADIUS protocol differ from TACACS? (Choose three.)A . RADIUS uses UDP to communicate with the NAC . RADIUS encrypts only the password field in an authentication packet.D . RADIUS authenticates and authorizes simultaneously, causing fewer packets to be transmitted.E . RADIUS uses TCP to...
What is the Cisco preferred countermeasure to mitigate CAM overflows?
What is the Cisco preferred countermeasure to mitigate CAM overflows?A . Port securityB . Dynamic port securityC . IP source guardD . Root guardView AnswerAnswer: B
How does a zone-based firewall implementation handle traffic between interfaces in the same zone?
How does a zone-based firewall implementation handle traffic between interfaces in the same zone?A . Traffic between two interfaces in the same zone is allowed by default.B . Traffic between interfaces in the same zone is blocked unless you configure the same-security permit command.C . Traffic between interfaces in the...
If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two.)
If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two.)A . The user will be prompted to authenticate using the enable passwordB . Authentication attempts to the router will be deniedC . Authentication...