What features can protect the data plane? (Choose three.)
What features can protect the data plane? (Choose three.)A . policingB . ACLsC . IPSD . antispoofingE . QoSF . DHCP-snoopingView AnswerAnswer: B,D,F
Where in the network would be the best place to deploy Cisco IOS IPS?
You are the security administrator for a large enterprise network with many remote locations. You have been given the assignment to deploy a Cisco IPS solution. Where in the network would be the best place to deploy Cisco IOS IPS?A . Inside the firewall of the corporate headquarters Internet connectionB...
Which command is needed to enable SSH support on a Cisco Router?
Which command is needed to enable SSH support on a Cisco Router?A . crypto key lock rsaB . crypto key generate rsaC . crypto key zeroize rsaD . crypto key unlock rsaView AnswerAnswer: B
Which source port does IKE use when NAT has been detected between two VPN gateways?
Which source port does IKE use when NAT has been detected between two VPN gateways?A . TCP 4500B . TCP 500C . UDP 4500D . UDP 500View AnswerAnswer: C
Which quantifiable item should you consider when your organization adopts new technologies?
Which quantifiable item should you consider when your organization adopts new technologies?A . threatsB . vulnerabilityC . riskD . exploitsView AnswerAnswer: C
Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method?
Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method?A . aaa authentication enable console LOCAL SERVER_GROUPB . aaa authentication enable console SERVER_GROUP LOCALC . aaa authentication enable console localD . aaa authentication enable console...
Which two functions can SIEM provide? (Choose Two)
Which two functions can SIEM provide? (Choose Two)A . Correlation between logs and events from multiple systems.B . event aggregation that allows for reduced log storage requirements.C . proactive malware analysis to block malicious traffic.D . dual-factor authentication.E . centralized firewall management.View AnswerAnswer: AC
Which tool can an attacker use to attempt a DDoS attack?
Which tool can an attacker use to attempt a DDoS attack?A . botnetB . Trojan horseC . virusD . adwareView AnswerAnswer: A
Which statement about the device time is true?
Refer to the exhibit. Which statement about the device time is true?A . The time is authoritative, but the NTP process has lost contact with its servers.B . The time is authoritative because the clock is in sync.C . The clock is out of sync.D . NTP is configured incorrectly.E...
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...