What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?

What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?A . It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January 1, 2014 and continue using the key indefinitely.B . It configures the device to begin...

June 14, 2018 No Comments READ MORE +

Which three statements are characteristics of DHCP Spoofing? (choose three)

Which three statements are characteristics of DHCP Spoofing? (choose three)A . Arp PoisoningB . Modify Traffic in transitC . Used to perform man-in-the-middle attackD . Physically modify the network gatewayE . Protect the identity of the attacker by masking the DHCP addressF . can access most network devicesView AnswerAnswer: ABC

June 13, 2018 No Comments READ MORE +

What is the effect of the given command?

Refer to the exhibit. What is the effect of the given command?A . It merges authentication and encryption methods to protect traffic that matches an ACC . It configures the network to use a different transform set between peers.D . It configures encryption for MD5 HMAF . It configures authentication...

June 13, 2018 No Comments READ MORE +

How does a zone paid handle traffic if the policy definition of the zone pair is missing?

How does a zone paid handle traffic if the policy definition of the zone pair is missing?A . It permits all traffic without logging.B . it drops all trafficC . it permits and logs all trafficD . it inspects all trafficView AnswerAnswer: B

June 13, 2018 No Comments READ MORE +

Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)

Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)A . The passwordB . The hashC . The keyD . The transform setView AnswerAnswer: B,C

June 12, 2018 No Comments READ MORE +

In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts as a hub?

In which type of attack does the attacker attempt to overload the CAM table on a switch so that the switch acts as a hub?A . MAC spoofingB . gratuitous ARPC . MAC floodingD . DoSView AnswerAnswer: C

June 8, 2018 No Comments READ MORE +

SSL certificates are issued by Certificate Authority(CA) are?

SSL certificates are issued by Certificate Authority(CA) are?A . Trusted rootB . Not trustedView AnswerAnswer: A

June 8, 2018 No Comments READ MORE +

In the router ospf 200 command, what does the value 200 stand for?

In the router ospf 200 command, what does the value 200 stand for?A . process IDB . area IDC . administrative distance valueD . ABR IDView AnswerAnswer: A

June 7, 2018 No Comments READ MORE +

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...

June 6, 2018 No Comments READ MORE +

Which two characteristics of the TACACS+ protocol are true? (Choose two.)

Which two characteristics of the TACACS+ protocol are true? (Choose two.) A. uses UDP ports 1645 or 1812 B. separates AAA functions C. encrypts the body of every packet D. offers extensive accounting capabilities E. is an open RFC standard protocolView AnswerAnswer: B, C Explanation: http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml Packet Encryption RADIUS encrypts...

June 5, 2018 No Comments READ MORE +