Which IPS detection method can you use to detect attacks that based on the attackers IP addresses?
Which IPS detection method can you use to detect attacks that based on the attackers IP addresses?A . Policy-basedB . Anomaly-basedC . Reputation-basedD . Signature-basedView AnswerAnswer: C
Which EAP method uses Protected Access Credentials?
Which EAP method uses Protected Access Credentials?A . EAP-FASTB . EAP-TLSC . EAP-PEAPD . EAP-GTCView AnswerAnswer: A
What type of firewall would use the given configuration line?
Refer to the exhibit. What type of firewall would use the given configuration line?A . a stateful firewallB . a personal firewallC . a proxy firewallD . an application firewallE . a stateless firewallView AnswerAnswer: A
In which stage of an attack does the attacker discover devices on a target network?
In which stage of an attack does the attacker discover devices on a target network?A . ReconnaissanceB . Covering tracksC . Gaining accessD . Maintaining accessView AnswerAnswer: A
What is the highest security level that can be configured for an interface on an ASA?
What is the highest security level that can be configured for an interface on an ASA?A . 0B . 50C . 100D . 200View AnswerAnswer: C Explanation:Security level 100: This is the highest security level on our ASA and by default this is assigned to the “inside” interface. Normally we use...
Which two statements about stateless firewalls are true? (Choose two.)
Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPE . Cisco IOS cannot implement them because...
Which three ESP fields can be encrypted during transmission? (Choose three.)
Which three ESP fields can be encrypted during transmission? (Choose three.)A . Security Parameter IndexB . Sequence NumberC . MAC AddressD . PaddingE . Pad LengthF . Next HeaderView AnswerAnswer: D,E,F
If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?
If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?A . The interface on both switches may shut downB . STP loops may occurC . The switch with the higher native VLAN may shut downD . The interface with the...
What is an advantage of implementing a Trusted Platform Module for disk encryption?
What is an advantage of implementing a Trusted Platform Module for disk encryption?A . It provides hardware authentication.B . It allows the hard disk to be transferred to another device without requiring re-encryption.disC . It supports a more complex encryption algorithm than other disk-encryption technologies.D . It can protect against...
What is the purpose of the Integrity component of the CIA triad?
What is the purpose of the Integrity component of the CIA triad?A . to ensure that only authorized parties can modify dataB . to determine whether data is relevantC . to create a process for accessing dataD . to ensure that only authorized parties can view dataView AnswerAnswer: A