What are the three layers of a hierarchical network design? (Choose three.)

What are the three layers of a hierarchical network design? (Choose three.)A . accessB . coreC . distributionD . userE . serverF . InternetView AnswerAnswer: A,B,C

January 6, 2019 No Comments READ MORE +

Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)

Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)A . FTPB . SSHC . TelnetD . AAAE . HTTPSF . HTTPView AnswerAnswer: B,E

January 5, 2019 No Comments READ MORE +

Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)

Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)A . EAPB . ASCIIC . PAPD . PEAPE . MS-CHAPv1F . MS-CHAPv2View AnswerAnswer: C,E,F

January 5, 2019 No Comments READ MORE +

In which two situations should you use out-of-band management? (Choose two.)

In which two situations should you use out-of-band management? (Choose two.)A . when a network device fails to forward packetsB . when you require ROMMON accessC . when management applications need concurrent access to the deviceD . when you require administrator access from multiple locationsE . when the control plane...

January 5, 2019 No Comments READ MORE +

Whit which type of Leyer 2 attack can you “do something” for one host:

Whit which type of Leyer 2 attack can you “do something” for one host:A . MAC spoofingB . CAM overflow….View AnswerAnswer: A

January 5, 2019 No Comments READ MORE +

How can you proect CDP from reconnaissance attacks?

How can you proect CDP from reconnaissance attacks?A . Enable dot1x on all ports that are connected to other switches.B . Disable CDP on ports connected to endpoints.C . Disbale CDP on trunk ports.D . Enable dynamic ARP inspection on all untrusted ports.View AnswerAnswer: B

January 5, 2019 No Comments READ MORE +

Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)

Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)A . Smart tunnels can be used by clients that do not have administrator privilegesB . Smart tunnels support all operating systemsC . Smart tunnels offer better performance than port forwardingD . Smart tunnels require the client to...

January 4, 2019 1 Comment READ MORE +

In a security context, which action can you take to address compliance?

In a security context, which action can you take to address compliance?A . Implement rules to prevent a vulnerability.B . Correct or counteract a vulnerability.C . Reduce the severity of a vulnerability.D . Follow directions from the security appliance manufacturer to remediate a vulnerability.View AnswerAnswer: A

January 3, 2019 No Comments READ MORE +

What are the three layers of a hierarchical network design? (Choose three.)

What are the three layers of a hierarchical network design? (Choose three.)A . accessB . coreC . distributionD . userE . serverF . InternetView AnswerAnswer: A,B,C

January 3, 2019 No Comments READ MORE +

Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)

Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)A . start-stopB . stop-recordC . stop-onlyD . stopView AnswerAnswer: A,C

January 2, 2019 No Comments READ MORE +