What type of algorithm uses the same key to encrypt and decrypt data?

What type of algorithm uses the same key to encrypt and decrypt data?A . a symmetric algorithmB . an asymmetric algorithmC . a Public Key Infrastructure algorithmD . an IP security algorithmView AnswerAnswer: A

August 13, 2018 No Comments READ MORE +

which feature allow from dynamic NAT pool to choose next IP address and not a port on a used IP address?

which feature allow from dynamic NAT pool to choose next IP address and not a port on a used IP address?A . next IPB . round robinC . Dynamic rotationD . Dynamic PAT rotationView AnswerAnswer: B

August 12, 2018 No Comments READ MORE +

What is the effect of the given command sequence?

Refer to the exhibit. What is the effect of the given command sequence?A . It configures IKE Phase 1.B . It configures a site-to-site VPN tunnel.C . It configures a crypto policy with a key size of 14400.D . It configures IPSec Phase 2.View AnswerAnswer: A

August 12, 2018 No Comments READ MORE +

While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPSec Phase 1 is down due to...

August 11, 2018 No Comments READ MORE +

What is the best way to confirm that AAA authentication is working properly?

What is the best way to confirm that AAA authentication is working properly?A . Use the test aaa command.B . Ping the NAS to confirm connectivity.C . Use the Cisco-recommended configuration for AAA authentication.D . Log into and out of the router, and then check the NAS authentication log.View AnswerAnswer:...

August 11, 2018 No Comments READ MORE +

Which network device does NTP authenticate?

Which network device does NTP authenticate?A . Only the time sourceB . Only the client deviceC . The firewall and the client deviceD . The client device and the time sourceView AnswerAnswer: A

August 11, 2018 No Comments READ MORE +

Which type of layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?

Which type of layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?A . BPDU attackB . DHCP StarvationC . CAM table overflowD . MAC address spoofingView AnswerAnswer: D

August 10, 2018 No Comments READ MORE +

What are two uses of SIEM software? (Choose two.)

What are two uses of SIEM software? (Choose two.)A . collecting and archiving syslog dataB . alerting administrators to security events in real timeC . performing automatic network auditsD . configuring firewall and IDS devicesE . scanning email for suspicious attachmentsView AnswerAnswer: A,B

August 10, 2018 No Comments READ MORE +

What is the most common Cisco Discovery Protocol version 1 attack?

What is the most common Cisco Discovery Protocol version 1 attack?A . Denial of ServiceB . MAC-address spoofingC . CAM-table overflowD . VLAN hoppingView AnswerAnswer: A

August 10, 2018 No Comments READ MORE +

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?A . The trunk port would go into an error-disabled state.B . A VLAN hopping attack would be successful.C . A VLAN hopping attack would be prevented.D ....

August 9, 2018 No Comments READ MORE +