What type of algorithm uses the same key to encrypt and decrypt data?
What type of algorithm uses the same key to encrypt and decrypt data?A . a symmetric algorithmB . an asymmetric algorithmC . a Public Key Infrastructure algorithmD . an IP security algorithmView AnswerAnswer: A
Which statement about zone-based firewall configuration is true?
Which statement about zone-based firewall configuration is true?A . Traffic is implicitly denied by default between interfaces the same zoneB . Traffic that is desired to or sourced from the self-zone is denied by defaultC . The zone must be configured before a can be assignedD . You can assign...
Which option is the cloud based security service from Cisco that provides URL filtering web browsing content security, and roaming user protection?
Which option is the cloud based security service from Cisco that provides URL filtering web browsing content security, and roaming user protection?A . Cloud web securityB . Cloud web ProtectionC . Cloud web ServiceD . Cloud advanced malware protectionView AnswerAnswer: A
Which wildcard mask is associated with a subnet mask of /27?
Which wildcard mask is associated with a subnet mask of /27?A . 0.0.0.31B . 0.0.027C . 0.0.0.224D . 0.0.0.255View AnswerAnswer: A
Which statement correctly describes the function of a private VLAN?
Which statement correctly describes the function of a private VLAN?A . A private VLAN partitions the Layer 2 broadcast domain of a VLAN into subdomainsB . A private VLAN partitions the Layer 3 broadcast domain of a VLAN into subdomainsC . A private VLAN enables the creation of multiple VLANs...
What type of attack was the Stuxnet virus?
What type of attack was the Stuxnet virus?A . cyber warfareB . hacktivismC . botnetD . social engineeringView AnswerAnswer: A
Which statement provides the best definition of malware?
Which statement provides the best definition of malware?A . Malware is unwanted software that is harmful or destructive.B . Malware is software used by nation states to commit cyber crimes.C . Malware is a collection of worms, viruses, and Trojan horses that is distributed as a single package.D . Malware...
What are two default Cisco IOS privilege levels? (Choose two.)
What are two default Cisco IOS privilege levels? (Choose two.)A . 0B . 1C . 5D . 7E . 10F . 15View AnswerAnswer: B,F
You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two).
You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two).A . Configure a proxy server to hide users' local IP addresses.B . Assign unique IP addresses...
Which type of firewall can act on the behalf of the end device?
Which type of firewall can act on the behalf of the end device?A . Stateful packetB . ApplicationC . PacketD . ProxyView AnswerAnswer: D