Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?
Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?A . Unidirectional Link DetectionB . Unicast Reverse Path ForwardingC . TrustSecD . IP Source GuardView AnswerAnswer: B
Which sensor mode can deny attackers inline?
Which sensor mode can deny attackers inline?A . IPSB . fail-closeC . IDSD . fail-openView AnswerAnswer: A
What is the actual IOS privilege level of User Exec mode?
What is the actual IOS privilege level of User Exec mode?A . 1B . 0C . 5D . 15View AnswerAnswer: A Explanation: By default, the Cisco IOS software command-line interface (CLI) has two levels of access to commands: user EXEC mode (level 1) and privileged EXEC mode (level 15). However,...
Which two statements about stateless firewalls are true? (Choose two.)
Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPE . Cisco IOS cannot implement them because...
Which command verifies phase 1 of an IPsec VPN on a Cisco router?
Which command verifies phase 1 of an IPsec VPN on a Cisco router?A . show crypto mapB . show crypto ipsec saC . show crypto isakmp saD . show crypto engine connection activeView AnswerAnswer: C
How does PEAP protect the EAP exchange?
How does PEAP protect the EAP exchange?A . It encrypts the exchange using the server certificate.B . It encrypts the exchange using the client certificate.C . It validates the server-supplied certificate, and then encrypts the exchange using the client certificate.D . It validates the client-supplied certificate, and then encrypts the...
Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?
Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?A . no switchport nonnegotiateB . switchportC . no switchport mode dynamic autoD . no switchportView AnswerAnswer: D
How does PEAP protect the EAP exchange?
How does PEAP protect the EAP exchange?A . It encrypts the exchange using the server certificate.B . It encrypts the exchange using the client certificate.C . It validates the server-supplied certificate, and then encrypts the exchange using the client certificate.D . It validates the client-supplied certificate, and then encrypts the...
How does a device on a network using ISE receive its digital certificate during the new-device registration process?
How does a device on a network using ISE receive its digital certificate during the new-device registration process? A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server. B. ISE issues a certificate from its internal CA server. C. ISE...
Which command is needed to enable SSH support on a Cisco Router?
Which command is needed to enable SSH support on a Cisco Router?A . crypto key lock rsaB . crypto key generate rsaC . crypto key zeroize rsaD . crypto key unlock rsaView AnswerAnswer: B