Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?

Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?A . Unidirectional Link DetectionB . Unicast Reverse Path ForwardingC . TrustSecD . IP Source GuardView AnswerAnswer: B

August 28, 2018 No Comments READ MORE +

Which sensor mode can deny attackers inline?

Which sensor mode can deny attackers inline?A . IPSB . fail-closeC . IDSD . fail-openView AnswerAnswer: A

August 28, 2018 No Comments READ MORE +

What is the actual IOS privilege level of User Exec mode?

What is the actual IOS privilege level of User Exec mode?A . 1B . 0C . 5D . 15View AnswerAnswer: A Explanation: By default, the Cisco IOS software command-line interface (CLI) has two levels of access to commands: user EXEC mode (level 1) and privileged EXEC mode (level 15). However,...

August 27, 2018 No Comments READ MORE +

Which two statements about stateless firewalls are true? (Choose two.)

Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPE . Cisco IOS cannot implement them because...

August 26, 2018 No Comments READ MORE +

Which command verifies phase 1 of an IPsec VPN on a Cisco router?

Which command verifies phase 1 of an IPsec VPN on a Cisco router?A . show crypto mapB . show crypto ipsec saC . show crypto isakmp saD . show crypto engine connection activeView AnswerAnswer: C

August 25, 2018 No Comments READ MORE +

How does PEAP protect the EAP exchange?

How does PEAP protect the EAP exchange?A . It encrypts the exchange using the server certificate.B . It encrypts the exchange using the client certificate.C . It validates the server-supplied certificate, and then encrypts the exchange using the client certificate.D . It validates the client-supplied certificate, and then encrypts the...

August 25, 2018 No Comments READ MORE +

Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?

Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?A . no switchport nonnegotiateB . switchportC . no switchport mode dynamic autoD . no switchportView AnswerAnswer: D

August 24, 2018 No Comments READ MORE +

How does PEAP protect the EAP exchange?

How does PEAP protect the EAP exchange?A . It encrypts the exchange using the server certificate.B . It encrypts the exchange using the client certificate.C . It validates the server-supplied certificate, and then encrypts the exchange using the client certificate.D . It validates the client-supplied certificate, and then encrypts the...

August 23, 2018 No Comments READ MORE +

How does a device on a network using ISE receive its digital certificate during the new-device registration process?

How does a device on a network using ISE receive its digital certificate during the new-device registration process? A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server. B. ISE issues a certificate from its internal CA server. C. ISE...

August 23, 2018 No Comments READ MORE +

Which command is needed to enable SSH support on a Cisco Router?

Which command is needed to enable SSH support on a Cisco Router?A . crypto key lock rsaB . crypto key generate rsaC . crypto key zeroize rsaD . crypto key unlock rsaView AnswerAnswer: B

August 23, 2018 No Comments READ MORE +