Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B
Which security term refers to a person, property, or data of value to a company?
Which security term refers to a person, property, or data of value to a company?A . RiskB . AssetC . Threat preventionD . Mitigation techniqueView AnswerAnswer: B
The command debug crypto isakmp results in ?
The command debug crypto isakmp results in ?A . Troubleshooting ISAKMP (Phase 1) negotiation problemsView AnswerAnswer: A
What do you use when you have a network object or group and want to use an IP address?
What do you use when you have a network object or group and want to use an IP address?A . Static NATB . Dynamic NATC . identity NATD . Static PATView AnswerAnswer: B
Which IPS mode is less secure than other options but allows optimal network throughput?
Which IPS mode is less secure than other options but allows optimal network throughput?A . promiscuous modeB . inline modeC . inline-bypass modeD . transparent mode.View AnswerAnswer: A
Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)
Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)A . The passwordB . The hashC . The keyD . The transform setView AnswerAnswer: B,C
What is the purpose of a honeypot IPS?
What is the purpose of a honeypot IPS?A . To create customized policiesB . To detect unknown attacksC . To normalize streamsD . To collect information about attacksView AnswerAnswer: D
What is the purpose of the Integrity component of the CIA triad?
What is the purpose of the Integrity component of the CIA triad?A . to ensure that only authorized parties can modify dataB . to determine whether data is relevantC . to create a process for accessing dataD . to ensure that only authorized parties can view dataView AnswerAnswer: A
Which feature filters CoPP packets?
Which feature filters CoPP packets?A . access control listsB . class mapsC . policy mapsD . route mapsView AnswerAnswer: A
Which IDS/IPS is used for monitoring system?
Which IDS/IPS is used for monitoring system?A . HIPSB . WIPSC . visibility toolView AnswerAnswer: A