What type of algorithm uses the same key to encrypt and decrypt data?
What type of algorithm uses the same key to encrypt and decrypt data?A . a symmetric algorithmB . an asymmetric algorithmC . a Public Key Infrastructure algorithmD . an IP security algorithmView AnswerAnswer: A
which feature allow from dynamic NAT pool to choose next IP address and not a port on a used IP address?
which feature allow from dynamic NAT pool to choose next IP address and not a port on a used IP address?A . next IPB . round robinC . Dynamic rotationD . Dynamic PAT rotationView AnswerAnswer: B
What is the effect of the given command sequence?
Refer to the exhibit. What is the effect of the given command sequence?A . It configures IKE Phase 1.B . It configures a site-to-site VPN tunnel.C . It configures a crypto policy with a key size of 14400.D . It configures IPSec Phase 2.View AnswerAnswer: A
While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPSec Phase 1 is down due to...
What is the best way to confirm that AAA authentication is working properly?
What is the best way to confirm that AAA authentication is working properly?A . Use the test aaa command.B . Ping the NAS to confirm connectivity.C . Use the Cisco-recommended configuration for AAA authentication.D . Log into and out of the router, and then check the NAS authentication log.View AnswerAnswer:...
Which network device does NTP authenticate?
Which network device does NTP authenticate?A . Only the time sourceB . Only the client deviceC . The firewall and the client deviceD . The client device and the time sourceView AnswerAnswer: A
Which type of layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?
Which type of layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?A . BPDU attackB . DHCP StarvationC . CAM table overflowD . MAC address spoofingView AnswerAnswer: D
What are two uses of SIEM software? (Choose two.)
What are two uses of SIEM software? (Choose two.)A . collecting and archiving syslog dataB . alerting administrators to security events in real timeC . performing automatic network auditsD . configuring firewall and IDS devicesE . scanning email for suspicious attachmentsView AnswerAnswer: A,B
What is the most common Cisco Discovery Protocol version 1 attack?
What is the most common Cisco Discovery Protocol version 1 attack?A . Denial of ServiceB . MAC-address spoofingC . CAM-table overflowD . VLAN hoppingView AnswerAnswer: A
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?A . The trunk port would go into an error-disabled state.B . A VLAN hopping attack would be successful.C . A VLAN hopping attack would be prevented.D ....