Which IPS detection method can you use to detect attacks that based on the attackers IP addresses?

Which IPS detection method can you use to detect attacks that based on the attackers IP addresses?A . Policy-basedB . Anomaly-basedC . Reputation-basedD . Signature-basedView AnswerAnswer: C

August 21, 2018 No Comments READ MORE +

Which EAP method uses Protected Access Credentials?

Which EAP method uses Protected Access Credentials?A . EAP-FASTB . EAP-TLSC . EAP-PEAPD . EAP-GTCView AnswerAnswer: A

August 20, 2018 No Comments READ MORE +

What type of firewall would use the given configuration line?

Refer to the exhibit. What type of firewall would use the given configuration line?A . a stateful firewallB . a personal firewallC . a proxy firewallD . an application firewallE . a stateless firewallView AnswerAnswer: A

August 19, 2018 No Comments READ MORE +

In which stage of an attack does the attacker discover devices on a target network?

In which stage of an attack does the attacker discover devices on a target network?A . ReconnaissanceB . Covering tracksC . Gaining accessD . Maintaining accessView AnswerAnswer: A

August 18, 2018 No Comments READ MORE +

What is the highest security level that can be configured for an interface on an ASA?

What is the highest security level that can be configured for an interface on an ASA?A . 0B . 50C . 100D . 200View AnswerAnswer: C Explanation:Security level 100: This is the highest security level on our ASA and by default this is assigned to the “inside” interface. Normally we use...

August 17, 2018 No Comments READ MORE +

Which two statements about stateless firewalls are true? (Choose two.)

Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPE . Cisco IOS cannot implement them because...

August 17, 2018 No Comments READ MORE +

Which three ESP fields can be encrypted during transmission? (Choose three.)

Which three ESP fields can be encrypted during transmission? (Choose three.)A . Security Parameter IndexB . Sequence NumberC . MAC AddressD . PaddingE . Pad LengthF . Next HeaderView AnswerAnswer: D,E,F

August 17, 2018 No Comments READ MORE +

If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?

If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?A . The interface on both switches may shut downB . STP loops may occurC . The switch with the higher native VLAN may shut downD . The interface with the...

August 17, 2018 No Comments READ MORE +

What is an advantage of implementing a Trusted Platform Module for disk encryption?

What is an advantage of implementing a Trusted Platform Module for disk encryption?A . It provides hardware authentication.B . It allows the hard disk to be transferred to another device without requiring re-encryption.disC . It supports a more complex encryption algorithm than other disk-encryption technologies.D . It can protect against...

August 15, 2018 No Comments READ MORE +

What is the purpose of the Integrity component of the CIA triad?

What is the purpose of the Integrity component of the CIA triad?A . to ensure that only authorized parties can modify dataB . to determine whether data is relevantC . to create a process for accessing dataD . to ensure that only authorized parties can view dataView AnswerAnswer: A

August 13, 2018 No Comments READ MORE +