Which source port does IKE use when NAT has been detected between two VPN gateways?

Which source port does IKE use when NAT has been detected between two VPN gateways?A . TCP 4500B . TCP 500C . UDP 4500D . UDP 500View AnswerAnswer: C

January 14, 2019 No Comments READ MORE +

What is the transition order of STP states on a Layer 2 switch interface?

What is the transition order of STP states on a Layer 2 switch interface?A . listening, learning, blocking, forwarding, disabledB . listening, blocking, learning, forwarding, disabledC . blocking, listening, learning, forwarding, disabledD . forwarding, listening, learning, blocking, disabledView AnswerAnswer: C

January 13, 2019 No Comments READ MORE +

What three actions are limitations when running IPS in promiscuous mode? (Choose three.)

What three actions are limitations when running IPS in promiscuous mode? (Choose three.)A . deny attackerB . deny packetC . modify packetD . request block connectionE . request block hostF . reset TCP connectionView AnswerAnswer: A,B,C

January 11, 2019 No Comments READ MORE +

Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)

Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)A . FTPB . SSHC . TelnetD . AAAE . HTTPSF . HTTPView AnswerAnswer: B,E

January 9, 2019 No Comments READ MORE +

When a company puts a security policy in place, what is the effect on the company’s business?

When a company puts a security policy in place, what is the effect on the company’s business?A . Minimizing riskB . Minimizing total cost of ownershipC . Minimizing liabilityD . Maximizing complianceView AnswerAnswer: A

January 9, 2019 No Comments READ MORE +

Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?

Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?A . advanced persistent threatB . targeted malwareC . drive-by spywareD . social activismView AnswerAnswer: A

January 9, 2019 No Comments READ MORE +

Which two services define cloud networks? (Choose two.)

Which two services define cloud networks? (Choose two.)A . Infrastructure as a ServiceB . Platform as a ServiceC . Security as a ServiceD . Compute as a ServiceE . Tenancy as a ServiceView AnswerAnswer: A,B

January 8, 2019 No Comments READ MORE +

SIMULATION

SIMULATION Scenario Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. New additional connectivity requirements: Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram. To access the...

January 8, 2019 No Comments READ MORE +

Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

January 8, 2019 No Comments READ MORE +

Which statement about communication over failover interfaces is true?

Which statement about communication over failover interfaces is true?A . All information that is sent over the failover and stateful failover interfaces is sent as clear text by default.B . All information that is sent over the failover interface is sent as clear text, but the stateful failover link is...

January 6, 2019 No Comments READ MORE +