Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)

Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B

November 21, 2018 No Comments READ MORE +

Which security term refers to a person, property, or data of value to a company?

Which security term refers to a person, property, or data of value to a company?A . RiskB . AssetC . Threat preventionD . Mitigation techniqueView AnswerAnswer: B

November 20, 2018 No Comments READ MORE +

The command debug crypto isakmp results in ?

The command debug crypto isakmp results in ?A . Troubleshooting ISAKMP (Phase 1) negotiation problemsView AnswerAnswer: A

November 19, 2018 No Comments READ MORE +

What do you use when you have a network object or group and want to use an IP address?

What do you use when you have a network object or group and want to use an IP address?A . Static NATB . Dynamic NATC . identity NATD . Static PATView AnswerAnswer: B

November 18, 2018 No Comments READ MORE +

Which IPS mode is less secure than other options but allows optimal network throughput?

Which IPS mode is less secure than other options but allows optimal network throughput?A . promiscuous modeB . inline modeC . inline-bypass modeD . transparent mode.View AnswerAnswer: A

November 17, 2018 No Comments READ MORE +

Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)

Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)A . The passwordB . The hashC . The keyD . The transform setView AnswerAnswer: B,C

November 17, 2018 No Comments READ MORE +

What is the purpose of a honeypot IPS?

What is the purpose of a honeypot IPS?A . To create customized policiesB . To detect unknown attacksC . To normalize streamsD . To collect information about attacksView AnswerAnswer: D

November 16, 2018 No Comments READ MORE +

What is the purpose of the Integrity component of the CIA triad?

What is the purpose of the Integrity component of the CIA triad?A . to ensure that only authorized parties can modify dataB . to determine whether data is relevantC . to create a process for accessing dataD . to ensure that only authorized parties can view dataView AnswerAnswer: A

November 16, 2018 No Comments READ MORE +

Which feature filters CoPP packets?

Which feature filters CoPP packets?A . access control listsB . class mapsC . policy mapsD . route mapsView AnswerAnswer: A

November 16, 2018 No Comments READ MORE +

Which IDS/IPS is used for monitoring system?

Which IDS/IPS is used for monitoring system?A . HIPSB . WIPSC . visibility toolView AnswerAnswer: A

November 14, 2018 No Comments READ MORE +