Which three statements about Cisco host-based IPS solutions are true? (Choose three.)
Which three statements about Cisco host-based IPS solutions are true? (Choose three.)A . It can view encrypted files.B . It can have more restrictive policies than network-based IPD . It can generate alerts based on behavior at the desktop level.E . It can be deployed at the perimeter.F . It...
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)A . deny attackerB . deny packetC . modify packetD . request block connectionE . request block hostF . reset TCP connectionView AnswerAnswer: A,B,C
The stealing of confidential information of a company comes under the scope of
The stealing of confidential information of a company comes under the scope ofA . ReconnaissanceB . Spoofing attackC . Social EngineeringD . Denial of ServiceView AnswerAnswer: C
Which two authentication types does OSPF support? (Choose two.)
Which two authentication types does OSPF support? (Choose two.)A . plaintextB . MD5C . HMACD . AES 256E . SHA-1F . DESView AnswerAnswer: A,B
Which statement about Cisco ACS authentication and authorization is true?
Which statement about Cisco ACS authentication and authorization is true?A . ACS servers can be clustered to provide scalability.B . ACS can query multiple Active Directory domains.C . ACS uses TACACS to proxy other authentication servers.D . ACS can use only one authorization profile to allow or deny requests.View AnswerAnswer:...
Which type of secure connectivity does an extranet provide?
Which type of secure connectivity does an extranet provide?A . other company networks to your company networkB . remote branch offices to your company networkC . your company network to the InternetD . new networks to your company networkView AnswerAnswer: A
What are the primary attack methods of VLAN hopping? (Choose two.)
What are the primary attack methods of VLAN hopping? (Choose two.)A . VoIP hoppingB . Switch spoofingC . CAM-table overflowD . Double taggingView AnswerAnswer: B,D
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URL filtering to solve the problem?
You have been tasked with blocking user access to websites that violate company policy, but the sites use dynamic IP addresses. What is the best practice for URL filtering to solve the problem?A . Enable URL filtering and use URL categorization to block the websites that violate company policy.B ....
Which two options are advantages of an application layer firewall? (Choose two.)
Which two options are advantages of an application layer firewall? (Choose two.)A . provides high-performance filteringB . makes DoS attacks difficultC . supports a large number of applicationsD . authenticates devicesE . authenticates individualsView AnswerAnswer: B, E Explanation: http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_white_paper0900aecd8058ec85.html Adding Intrusion Prevention Gartner's definition of a next-generation firewall is one...
What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?
What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?A . split tunnelingB . hairpinningC . tunnel modeD . transparent modeView AnswerAnswer: A