which are two valid TCP connection states (pick 2) is the gist of the question.
which are two valid TCP connection states (pick 2) is the gist of the question.A . SYN-RCVDB . ClosedC . SYN-WAITD . RCVDE . SENTView AnswerAnswer: AB
Using a stateful packet firewall and given an inside ACL entry of permit ip 192.16.1.0 0.0.0.255 any, what would be the resulting dynamically configured ACL for the return traffic on the outside ACL?
Refer to the exhibit. Using a stateful packet firewall and given an inside ACL entry of permit ip 192.16.1.0 0.0.0.255 any, what would be the resulting dynamically configured ACL for the return traffic on the outside ACL?A . permit tcp host 172.16.16.10 eq 80 host 192.168.1.11 eq 2300B . permit...
Which type of IPS can identify worms that are propagating in a network?
Which type of IPS can identify worms that are propagating in a network?A . Policy-based IPSB . Anomaly-based IPSC . Reputation-based IPSD . Signature-based IPSView AnswerAnswer: B
Which two statements about Telnet access to the ASA are true? (Choose two).
Which two statements about Telnet access to the ASA are true? (Choose two).A . You may VPN to the lowest security interface to telnet to an inside interface.B . You must configure an AAA server to enable Telnet.C . You can access all interfaces on an ASA using Telnet.D ....
What are two challenges faced when deploying host-level IPS? (Choose Two)
What are two challenges faced when deploying host-level IPS? (Choose Two)A . The deployment must support multiple operating systems.B . It does not provide protection for offsite computers.C . It is unable to provide a complete network picture of an attack.D . It is unable to determine the outcome of...
Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)
Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)A . Port securityB . DHCP snoopingC . IP source guardD . Dynamic ARP inspectionView AnswerAnswer: B,D
What is the only permitted operation for processing multicast traffic on zone-based firewalls?
What is the only permitted operation for processing multicast traffic on zone-based firewalls?A . Only control plane policing can protect the control plane against multicast traffic.B . Stateful inspection of multicast traffic is supported only for the self-zone.C . Stateful inspection for multicast traffic is supported only between the self-zone...
On Cisco ISR routers, for what purpose is the realm-cisco.pub public encryption key used?
On Cisco ISR routers, for what purpose is the realm-cisco.pub public encryption key used?A . used for SSH server/client authentication and encryptionB . used to verify the digital signature of the IPS signature fileC . used to generate a persistent self-signed identity certificate for the ISR so administrators can authenticate...
Which FirePOWER preprocessor engine is used to prevent SYN attacks?
Which FirePOWER preprocessor engine is used to prevent SYN attacks?A . Rate-Based PreventionB . Portscan DetectionC . IP DefragmentationD . Inline NormalizationView AnswerAnswer: A
The Oakley cryptography protocol is compatible with following for managing security?
The Oakley cryptography protocol is compatible with following for managing security?A . IPSecB . ISAKMPView AnswerAnswer: B