Which source port does IKE use when NAT has been detected between two VPN gateways?
Which source port does IKE use when NAT has been detected between two VPN gateways?A . TCP 4500B . TCP 500C . UDP 4500D . UDP 500View AnswerAnswer: C
What is the transition order of STP states on a Layer 2 switch interface?
What is the transition order of STP states on a Layer 2 switch interface?A . listening, learning, blocking, forwarding, disabledB . listening, blocking, learning, forwarding, disabledC . blocking, listening, learning, forwarding, disabledD . forwarding, listening, learning, blocking, disabledView AnswerAnswer: C
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)A . deny attackerB . deny packetC . modify packetD . request block connectionE . request block hostF . reset TCP connectionView AnswerAnswer: A,B,C
Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)
Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)A . FTPB . SSHC . TelnetD . AAAE . HTTPSF . HTTPView AnswerAnswer: B,E
When a company puts a security policy in place, what is the effect on the company’s business?
When a company puts a security policy in place, what is the effect on the company’s business?A . Minimizing riskB . Minimizing total cost of ownershipC . Minimizing liabilityD . Maximizing complianceView AnswerAnswer: A
Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?
Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?A . advanced persistent threatB . targeted malwareC . drive-by spywareD . social activismView AnswerAnswer: A
Which two services define cloud networks? (Choose two.)
Which two services define cloud networks? (Choose two.)A . Infrastructure as a ServiceB . Platform as a ServiceC . Security as a ServiceD . Compute as a ServiceE . Tenancy as a ServiceView AnswerAnswer: A,B
SIMULATION
SIMULATION Scenario Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. New additional connectivity requirements: Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram. To access the...
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?
Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....
Which statement about communication over failover interfaces is true?
Which statement about communication over failover interfaces is true?A . All information that is sent over the failover and stateful failover interfaces is sent as clear text by default.B . All information that is sent over the failover interface is sent as clear text, but the stateful failover link is...