What type of attack was the Stuxnet virus?

What type of attack was the Stuxnet virus?A . cyber warfareB . hacktivismC . botnetD . social engineeringView AnswerAnswer: A

October 18, 2018 No Comments READ MORE +

Which type of address translation should be used when a Cisco ASA is in transparent mode?

Which type of address translation should be used when a Cisco ASA is in transparent mode?A . Static NATB . Dynamic NATC . OverloadD . Dynamic PATView AnswerAnswer: A

October 18, 2018 No Comments READ MORE +

What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?

What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?A . 5 secondsB . 10 secondsC . 15 secondsD . 20 secondsView AnswerAnswer: A

October 17, 2018 No Comments READ MORE +

Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?

Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?A . hackB . mitigationC . riskD . vulnerabilityE . exploitView AnswerAnswer: D Explanation: vulnerability A flaw or weakness in a system’s design or implementation that could...

October 16, 2018 No Comments READ MORE +

Which type of social-engineering attacks uses normal telephone service as the attack vector?

Which type of social-engineering attacks uses normal telephone service as the attack vector?A . vishingB . phisingC . smishingD . war dialingView AnswerAnswer: B

October 14, 2018 1 Comment READ MORE +

If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?

If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP BPDU guardB . loop guardC . STP Root guardD . EtherChannel guardView AnswerAnswer: A

October 14, 2018 1 Comment READ MORE +

Drag the hash or algorithm from the left column to its appropriate category on the right

DRAG DROP Drag the hash or algorithm from the left column to its appropriate category on the right. View AnswerAnswer: Explanation: https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html

October 13, 2018 No Comments READ MORE +

Which two characteristics apply to an Intrusion Prevention System (IPS) ? Choose two

Which two characteristics apply to an Intrusion Prevention System (IPS) ? Choose twoA . Does not add delay to the original traffic.B . Cabled directly inline with the flow of the network traffic.C . Can drop traffic based on a set of rules.D . Runs in promoscous mode.E . Cannot...

October 13, 2018 No Comments READ MORE +

How many times was a read-only string used to attempt a write operation?

Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A . 9B . 6C . 4D . 3E . 2View AnswerAnswer: A

October 10, 2018 No Comments READ MORE +

Which statement about application blocking is true?

Which statement about application blocking is true?A . It blocks access to specific programs.B . It blocks access to files with specific extensions.C . It blocks access to specific network addresses.D . It blocks access to specific network services.View AnswerAnswer: A

October 9, 2018 No Comments READ MORE +