What can the SMTP preprocessor in FirePOWER normalize?

What can the SMTP preprocessor in FirePOWER normalize?A . It can extract and decode email attachments in client to server traffic.B . It can look up the email sender.C . It compares known threats to the email sender.D . It can forward the SMTP traffic to an email filter server.E...

January 14, 2020 No Comments READ MORE +

What three actions are limitations when running IPS in promiscuous mode? (Choose three.)

What three actions are limitations when running IPS in promiscuous mode? (Choose three.)A . deny attackerB . deny packetC . modify packetD . request block connectionE . request block hostF . reset TCP connectionView AnswerAnswer: A,B,C Explanation: In promiscuous mode, packets do not flow through the sensor. The disadvantage of...

January 13, 2020 No Comments READ MORE +

What is a possible result of this activity?

An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?A . The switch could offer fake DHCP addresses.B . The switch could become the root bridge.C . The switch could be allowed to join the VTP domain.D . The...

January 13, 2020 No Comments READ MORE +

In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?

In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?A . gratuitous ARPB . ARP poisoningC . IP spoofingD . MAC spoofingView AnswerAnswer: D Explanation: If a switch receives an inferior BPDU, nothing...

January 13, 2020 No Comments READ MORE +

Which two statements about Telnet access to the ASA are true? (Choose two).

Which two statements about Telnet access to the ASA are true? (Choose two).A . You may VPN to the lowest security interface to telnet to an inside interface.B . You must configure an AAA server to enable Telnet.C . You can access all interfaces on an ASA using Telnet.D ....

January 13, 2020 No Comments READ MORE +

How does the Cisco ASA use Active Directory to authorize VPN users?

How does the Cisco ASA use Active Directory to authorize VPN users?A . It queries the Active Directory server for a specific attribute for the specified user.B . It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server.C . It downloads and...

January 13, 2020 No Comments READ MORE +

Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)

Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)A . Modifying packetsB . Requesting connection blockingC . Denying packetsD . Resetting the TCP connectionE . Requesting host blockingF . Denying framesView AnswerAnswer: B,D,E Explanation: Promiscuous Mode Event Actions + Request block host: This event action will...

January 13, 2020 No Comments READ MORE +

When a company puts a security policy in place, what is the effect on the company’s business?

When a company puts a security policy in place, what is the effect on the company’s business?A . Minimizing riskB . Minimizing total cost of ownershipC . Minimizing liabilityD . Maximizing complianceView AnswerAnswer: A Explanation: The first step in protecting a business network is creating a security policy. A security...

January 12, 2020 No Comments READ MORE +

Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)

Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)A . EAPB . ASCIIC . PAPD . PEAPE . MS-CHAPv1F . MS-CHAPv2View AnswerAnswer: B,C,E Explanation: The ASA supports TACACS+ server authentication with the following protocols: ASCII, PAP, CHAP, and MS- CHAPv1. Source: http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_c onfig/ aaa_tacacs.pdf

January 11, 2020 No Comments READ MORE +

Which statement about Cisco ACS authentication and authorization is true?

Which statement about Cisco ACS authentication and authorization is true?A . ACS servers can be clustered to provide scalability.B . ACS can query multiple Active Directory domains.C . ACS uses TACACS to proxy other authentication servers.D . ACS can use only one authorization profile to allow or deny requests.View AnswerAnswer:...

January 11, 2020 No Comments READ MORE +