Which three ESP fields can be encrypted during transmission? (Choose three.)
Which three ESP fields can be encrypted during transmission? (Choose three.)A . Security Parameter IndexB . Sequence NumberC . MAC AddressD . PaddingE . Pad LengthF . Next HeaderView AnswerAnswer: D,E,F
Which type of secure connectivity does an extranet provide?
Which type of secure connectivity does an extranet provide?A . other company networks to your company networkB . remote branch offices to your company networkC . your company network to the InternetD . new networks to your company networkView AnswerAnswer: A
Which type of attack can exploit design flaws in the implementation of an application without going noticed?
Which type of attack can exploit design flaws in the implementation of an application without going noticed?A . Volume-based DDoS attacks.B . application DDoS flood attacks.C . DHCP starvation attacksD . low-rate DoS attacksView AnswerAnswer: D
You have configured R1 and R2 as shown, but the routers are unable to establish a site-to-site VPN tunnel. What action can you take to correct the problem?
Refer to the exhibit. You have configured R1 and R2 as shown, but the routers are unable to establish a site-to-site VPN tunnel. What action can you take to correct the problem?A . Edit the crypto keys on R1 and R2 to match.B . Edit the ISAKMP policy sequence numbers...
Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS wizard? (Choose four.)
Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS wizard? (Choose four.)A . Select the interface(s) to apply the IPS rule.B . Select the traffic flow direction that should be applied by the IPS rule.C . Add or remove IPS alerts actions...
Which statement about Cisco ACS authentication and authorization is true?
Which statement about Cisco ACS authentication and authorization is true?A . ACS servers can be clustered to provide scalability.B . ACS can query multiple Active Directory domains.C . ACS uses TACACS to proxy other authentication servers.D . ACS can use only one authorization profile to allow or deny requests.View AnswerAnswer:...
Which three statements describe DHCP spoofing attacks? (Choose three.)
Which three statements describe DHCP spoofing attacks? (Choose three.)A . They can modify traffic in transit.B . They are used to perform man-in-the-middle attacks.C . They use ARP poisoning.D . They can access most network devices.E . They protect the identity of the attacker by masking the DHCP address.F ....
Which two statements about Telnet access to the ASA are true? (Choose two).
Which two statements about Telnet access to the ASA are true? (Choose two).A . You may VPN to the lowest security interface to telnet to an inside interface.B . You must configure an AAA server to enable Telnet.C . You can access all interfaces on an ASA using Telnet.D ....
You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two).
You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two).A . Configure a proxy server to hide users' local IP addresses.B . Assign unique IP addresses...
For what reason would you configure multiple security contexts on the ASA firewall?
For what reason would you configure multiple security contexts on the ASA firewall?A . To separate different departments and business units.B . To enable the use of VRFs on routers that are adjacently connected.C . To provide redundancy and high availability within the organization.D . To enable the use of...