What features can protect the data plane? (Choose three.)

What features can protect the data plane? (Choose three.)A . policingB . ACLsC . IPSD . antispoofingE . QoSF . DHCP-snoopingView AnswerAnswer: B,D,F

August 5, 2018 No Comments READ MORE +

Where in the network would be the best place to deploy Cisco IOS IPS?

You are the security administrator for a large enterprise network with many remote locations. You have been given the assignment to deploy a Cisco IPS solution. Where in the network would be the best place to deploy Cisco IOS IPS?A . Inside the firewall of the corporate headquarters Internet connectionB...

August 5, 2018 No Comments READ MORE +

Which command is needed to enable SSH support on a Cisco Router?

Which command is needed to enable SSH support on a Cisco Router?A . crypto key lock rsaB . crypto key generate rsaC . crypto key zeroize rsaD . crypto key unlock rsaView AnswerAnswer: B

August 4, 2018 No Comments READ MORE +

Which source port does IKE use when NAT has been detected between two VPN gateways?

Which source port does IKE use when NAT has been detected between two VPN gateways?A . TCP 4500B . TCP 500C . UDP 4500D . UDP 500View AnswerAnswer: C

August 3, 2018 No Comments READ MORE +

Which quantifiable item should you consider when your organization adopts new technologies?

Which quantifiable item should you consider when your organization adopts new technologies?A . threatsB . vulnerabilityC . riskD . exploitsView AnswerAnswer: C

August 3, 2018 No Comments READ MORE +

Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method?

Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method?A . aaa authentication enable console LOCAL SERVER_GROUPB . aaa authentication enable console SERVER_GROUP LOCALC . aaa authentication enable console localD . aaa authentication enable console...

August 2, 2018 No Comments READ MORE +

Which two functions can SIEM provide? (Choose Two)

Which two functions can SIEM provide? (Choose Two)A . Correlation between logs and events from multiple systems.B . event aggregation that allows for reduced log storage requirements.C . proactive malware analysis to block malicious traffic.D . dual-factor authentication.E . centralized firewall management.View AnswerAnswer: AC

July 31, 2018 1 Comment READ MORE +

Which tool can an attacker use to attempt a DDoS attack?

Which tool can an attacker use to attempt a DDoS attack?A . botnetB . Trojan horseC . virusD . adwareView AnswerAnswer: A

July 31, 2018 No Comments READ MORE +

Which statement about the device time is true?

Refer to the exhibit. Which statement about the device time is true?A . The time is authoritative, but the NTP process has lost contact with its servers.B . The time is authoritative because the clock is in sync.C . The clock is out of sync.D . NTP is configured incorrectly.E...

July 31, 2018 No Comments READ MORE +

If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?

If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...

July 29, 2018 No Comments READ MORE +