Which type of IPS can identify worms that are propagating in a network?
Which type of IPS can identify worms that are propagating in a network?A . Policy-based IPSB . Anomaly-based IPSC . Reputation-based IPSD . Signature-based IPSView AnswerAnswer: B
Which security zone is automatically defined by the system?
Which security zone is automatically defined by the system?A . The source zoneB . The self zoneC . The destination zoneD . The inside zoneView AnswerAnswer: B
Diffie-Hellman key exchange question
Diffie-Hellman key exchange questionA . IKEView AnswerAnswer: A
Which tool can an attacker use to attempt a DDoS attack?
Which tool can an attacker use to attempt a DDoS attack?A . botnetB . Trojan horseC . virusD . adwareView AnswerAnswer: A
What type of packet creates and performs network operations on a network device?
What type of packet creates and performs network operations on a network device?A . control plane packetsB . data plane packetsC . management plane packetsD . services plane packetsView AnswerAnswer: A
With Cisco IOS zone-based policy firewall, by default, which three types of traffic are permitted by the router when some of the router interfaces are assigned to a zone? (Choose three.)
With Cisco IOS zone-based policy firewall, by default, which three types of traffic are permitted by the router when some of the router interfaces are assigned to a zone? (Choose three.)A . traffic flowing between a zone member interface and any interface that is not a zone memberB . traffic...
What are the primary attack methods of VLAN hopping? (Choose two.)
What are the primary attack methods of VLAN hopping? (Choose two.)A . VoIP hoppingB . Switch spoofingC . CAM-table overflowD . Double taggingView AnswerAnswer: B,D
What configure mode you used for the command ip ospf authentication-key c1$c0?
What configure mode you used for the command ip ospf authentication-key c1$c0?A . globalB . privilegedC . in-lineD . InterfaceView AnswerAnswer: D Explanation: ip ospf authentication-key is used under interface configuration mode, so it’s in interface level, under global configuration mode. If it asks about interface level then choose that....
SYN flood attack is a form of ?
SYN flood attack is a form of ?A . Denial of Service attackB . Man in the middle attackC . Spoofing attackView AnswerAnswer: A
Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?
Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....