Where OAKLEY and SKEME come to play?

Where OAKLEY and SKEME come to play?A . IKEB . ISAKMPC . DESView AnswerAnswer: A

December 3, 2018 No Comments READ MORE +

Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end user?

Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end user?A . Allow with inspectionB . Allow without inspectionC . BlockD . TrustE . MonitorView AnswerAnswer: A

December 1, 2018 No Comments READ MORE +

What is true about the Cisco IOS Resilient Configuration feature?

What is true about the Cisco IOS Resilient Configuration feature?A . The feature can be disabled through a remote sessionB . There is additional space required to secure the primary Cisco IOS Image fileC . The feature automatically detects image and configuration version mismatchD . Remote storage is used for...

December 1, 2018 No Comments READ MORE +

What type of security support is provided by the Open Web Application Security Project?

What type of security support is provided by the Open Web Application Security Project?A . Education about common Web site vulnerabilities.B . A Web site security framework.C . A security discussion forum for Web site developers.D . Scoring of common vulnerabilities and exposures.View AnswerAnswer: A

December 1, 2018 No Comments READ MORE +

What is one requirement for locking a wired or wireless device from ISE?

What is one requirement for locking a wired or wireless device from ISE?A . The ISE agent must be installed on the device.B . The device must be connected to the network when the lock command is executed.C . The user must approve the locking action.D . The organization must...

November 30, 2018 No Comments READ MORE +

In which stage of an attack does the attacker discover devices on a target network?

In which stage of an attack does the attacker discover devices on a target network?A . ReconnaissanceB . Covering tracksC . Gaining accessD . Maintaining accessView AnswerAnswer: A

November 30, 2018 No Comments READ MORE +

Referencing the CIA model, in which scenario is a hash-only function most appropriate?

Referencing the CIA model, in which scenario is a hash-only function most appropriate?A . securing wireless transmissions.B . securing data in files.C . securing real-time trafficD . securing data at restView AnswerAnswer: D

November 29, 2018 No Comments READ MORE +

What security feature allows a private IP address to access the Internet by translating it to a public address?

What security feature allows a private IP address to access the Internet by translating it to a public address?A . NATB . hairpinningC . Trusted Network DetectionD . Certification AuthorityView AnswerAnswer: A

November 29, 2018 No Comments READ MORE +

Which statement correctly describes the function of a private VLAN?

Which statement correctly describes the function of a private VLAN?A . A private VLAN partitions the Layer 2 broadcast domain of a VLAN into subdomainsB . A private VLAN partitions the Layer 3 broadcast domain of a VLAN into subdomainsC . A private VLAN enables the creation of multiple VLANs...

November 28, 2018 No Comments READ MORE +

Which statement about application blocking is true?

Which statement about application blocking is true?A . It blocks access to specific programs.B . It blocks access to files with specific extensions.C . It blocks access to specific network addresses.D . It blocks access to specific network services.View AnswerAnswer: A

November 28, 2018 No Comments READ MORE +