Where OAKLEY and SKEME come to play?
Where OAKLEY and SKEME come to play?A . IKEB . ISAKMPC . DESView AnswerAnswer: A
Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end user?
Which Sourcefire event action should you choose if you want to block only malicious traffic from a particular end user?A . Allow with inspectionB . Allow without inspectionC . BlockD . TrustE . MonitorView AnswerAnswer: A
What is true about the Cisco IOS Resilient Configuration feature?
What is true about the Cisco IOS Resilient Configuration feature?A . The feature can be disabled through a remote sessionB . There is additional space required to secure the primary Cisco IOS Image fileC . The feature automatically detects image and configuration version mismatchD . Remote storage is used for...
What type of security support is provided by the Open Web Application Security Project?
What type of security support is provided by the Open Web Application Security Project?A . Education about common Web site vulnerabilities.B . A Web site security framework.C . A security discussion forum for Web site developers.D . Scoring of common vulnerabilities and exposures.View AnswerAnswer: A
What is one requirement for locking a wired or wireless device from ISE?
What is one requirement for locking a wired or wireless device from ISE?A . The ISE agent must be installed on the device.B . The device must be connected to the network when the lock command is executed.C . The user must approve the locking action.D . The organization must...
In which stage of an attack does the attacker discover devices on a target network?
In which stage of an attack does the attacker discover devices on a target network?A . ReconnaissanceB . Covering tracksC . Gaining accessD . Maintaining accessView AnswerAnswer: A
Referencing the CIA model, in which scenario is a hash-only function most appropriate?
Referencing the CIA model, in which scenario is a hash-only function most appropriate?A . securing wireless transmissions.B . securing data in files.C . securing real-time trafficD . securing data at restView AnswerAnswer: D
What security feature allows a private IP address to access the Internet by translating it to a public address?
What security feature allows a private IP address to access the Internet by translating it to a public address?A . NATB . hairpinningC . Trusted Network DetectionD . Certification AuthorityView AnswerAnswer: A
Which statement correctly describes the function of a private VLAN?
Which statement correctly describes the function of a private VLAN?A . A private VLAN partitions the Layer 2 broadcast domain of a VLAN into subdomainsB . A private VLAN partitions the Layer 3 broadcast domain of a VLAN into subdomainsC . A private VLAN enables the creation of multiple VLANs...
Which statement about application blocking is true?
Which statement about application blocking is true?A . It blocks access to specific programs.B . It blocks access to files with specific extensions.C . It blocks access to specific network addresses.D . It blocks access to specific network services.View AnswerAnswer: A