What does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?A . IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.B . ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.C . IKE version 2 security associations are established...

January 17, 2020 No Comments READ MORE +

What type of firewall would use the given configuration line?

Refer to the exhibit. What type of firewall would use the given configuration line? A. a stateful firewall B. a personal firewall C. a proxy firewall D. an application firewall E. a stateless firewallView AnswerAnswer: A Explanation: The output is from "show conn" command on an ASA. This is another...

January 17, 2020 No Comments READ MORE +

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?A . The trunk port would go into an error-disabled state.B . A VLAN hopping attack would be successful.C . A VLAN hopping attack would be prevented.D ....

January 17, 2020 No Comments READ MORE +

Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?

Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?A . FlexConfigB . Device ManagerC . Report ManagerD . Health and Performance MonitorView AnswerAnswer: D Explanation: Health and Performance Monitor (HPM) ­ Monitors and displays key health, performance and VPN data for...

January 16, 2020 No Comments READ MORE +

Which type of IPS can identify worms that are propagating in a network?

Which type of IPS can identify worms that are propagating in a network?A . Policy-based IPSB . Anomaly-based IPSC . Reputation-based IPSD . Signature-based IPSView AnswerAnswer: B Explanation: An example of anomaly-based IPS/IDS is creating a baseline of how many TCP sender requests are generated on average each minute that...

January 16, 2020 No Comments READ MORE +

What is the FirePOWER impact flag used for?

What is the FirePOWER impact flag used for?A . A value that indicates the potential severity of an attack.B . A value that the administrator assigns to each signature.C . A value that sets the priority of a signature.D . A value that measures the application awareness.View AnswerAnswer: A Explanation:...

January 16, 2020 No Comments READ MORE +

Which FirePOWER preprocessor engine is used to prevent SYN attacks?

Which FirePOWER preprocessor engine is used to prevent SYN attacks?A . Rate-Based PreventionB . Portscan DetectionC . IP DefragmentationD . Inline NormalizationView AnswerAnswer: A Explanation: Rate-based attack prevention identifies abnormal traffic patterns and attempts to minimize the impact of that traffic on legitimate requests. Rate-based attacks usually have one of...

January 15, 2020 No Comments READ MORE +

What type of attack was the Stuxnet virus?

What type of attack was the Stuxnet virus?A . cyber warfareB . hacktivismC . botnetD . social engineeringView AnswerAnswer: A Explanation: Stuxnet is a computer worm that targets industrial control systems that are used to monitor and control large scale industrial facilities like power plants, dams, waste processing systems and...

January 15, 2020 No Comments READ MORE +

Which command verifies phase 1 of an IPsec VPN on a Cisco router?

Which command verifies phase 1 of an IPsec VPN on a Cisco router?A . show crypto mapB . show crypto ipsec saC . show crypto isakmp saD . show crypto engine connection activeView AnswerAnswer: C Explanation: A show crypto isakmp sa command shows the ISAKMP SA to be in MM_NO_STATE....

January 14, 2020 No Comments READ MORE +

Which Sourcefire logging action should you choose to record the most detail about a connection?

Which Sourcefire logging action should you choose to record the most detail about a connection?A . Enable logging at the end of the session.B . Enable logging at the beginning of the session.C . Enable alerts via SNMP to log events off-box.D . Enable eStreamer to log events off-box.View AnswerAnswer:...

January 14, 2020 No Comments READ MORE +