What type of attack was the Stuxnet virus?
What type of attack was the Stuxnet virus?A . cyber warfareB . hacktivismC . botnetD . social engineeringView AnswerAnswer: A
Which type of address translation should be used when a Cisco ASA is in transparent mode?
Which type of address translation should be used when a Cisco ASA is in transparent mode?A . Static NATB . Dynamic NATC . OverloadD . Dynamic PATView AnswerAnswer: A
What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?
What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?A . 5 secondsB . 10 secondsC . 15 secondsD . 20 secondsView AnswerAnswer: A
Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?
Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?A . hackB . mitigationC . riskD . vulnerabilityE . exploitView AnswerAnswer: D Explanation: vulnerability A flaw or weakness in a system’s design or implementation that could...
Which type of social-engineering attacks uses normal telephone service as the attack vector?
Which type of social-engineering attacks uses normal telephone service as the attack vector?A . vishingB . phisingC . smishingD . war dialingView AnswerAnswer: B
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP BPDU guardB . loop guardC . STP Root guardD . EtherChannel guardView AnswerAnswer: A
Drag the hash or algorithm from the left column to its appropriate category on the right
DRAG DROP Drag the hash or algorithm from the left column to its appropriate category on the right. View AnswerAnswer: Explanation: https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
Which two characteristics apply to an Intrusion Prevention System (IPS) ? Choose two
Which two characteristics apply to an Intrusion Prevention System (IPS) ? Choose twoA . Does not add delay to the original traffic.B . Cabled directly inline with the flow of the network traffic.C . Can drop traffic based on a set of rules.D . Runs in promoscous mode.E . Cannot...
How many times was a read-only string used to attempt a write operation?
Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A . 9B . 6C . 4D . 3E . 2View AnswerAnswer: A
Which statement about application blocking is true?
Which statement about application blocking is true?A . It blocks access to specific programs.B . It blocks access to files with specific extensions.C . It blocks access to specific network addresses.D . It blocks access to specific network services.View AnswerAnswer: A