Which type of IPS can identify worms that are propagating in a network?

Which type of IPS can identify worms that are propagating in a network?A . Policy-based IPSB . Anomaly-based IPSC . Reputation-based IPSD . Signature-based IPSView AnswerAnswer: B

December 31, 2018 No Comments READ MORE +

Which security zone is automatically defined by the system?

Which security zone is automatically defined by the system?A . The source zoneB . The self zoneC . The destination zoneD . The inside zoneView AnswerAnswer: B

December 30, 2018 No Comments READ MORE +

Diffie-Hellman key exchange question

Diffie-Hellman key exchange questionA . IKEView AnswerAnswer: A

December 30, 2018 No Comments READ MORE +

Which tool can an attacker use to attempt a DDoS attack?

Which tool can an attacker use to attempt a DDoS attack?A . botnetB . Trojan horseC . virusD . adwareView AnswerAnswer: A

December 30, 2018 No Comments READ MORE +

What type of packet creates and performs network operations on a network device?

What type of packet creates and performs network operations on a network device?A . control plane packetsB . data plane packetsC . management plane packetsD . services plane packetsView AnswerAnswer: A

December 30, 2018 No Comments READ MORE +

With Cisco IOS zone-based policy firewall, by default, which three types of traffic are permitted by the router when some of the router interfaces are assigned to a zone? (Choose three.)

With Cisco IOS zone-based policy firewall, by default, which three types of traffic are permitted by the router when some of the router interfaces are assigned to a zone? (Choose three.)A . traffic flowing between a zone member interface and any interface that is not a zone memberB . traffic...

December 29, 2018 No Comments READ MORE +

What are the primary attack methods of VLAN hopping? (Choose two.)

What are the primary attack methods of VLAN hopping? (Choose two.)A . VoIP hoppingB . Switch spoofingC . CAM-table overflowD . Double taggingView AnswerAnswer: B,D

December 29, 2018 No Comments READ MORE +

What configure mode you used for the command ip ospf authentication-key c1$c0?

What configure mode you used for the command ip ospf authentication-key c1$c0?A . globalB . privilegedC . in-lineD . InterfaceView AnswerAnswer: D Explanation: ip ospf authentication-key is used under interface configuration mode, so it’s in interface level, under global configuration mode. If it asks about interface level then choose that....

December 27, 2018 No Comments READ MORE +

SYN flood attack is a form of ?

SYN flood attack is a form of ?A . Denial of Service attackB . Man in the middle attackC . Spoofing attackView AnswerAnswer: A

December 27, 2018 No Comments READ MORE +

Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

December 27, 2018 No Comments READ MORE +