What technology can you use to provide data confidentiality, data integrity and data origin authentication on your network?

What technology can you use to provide data confidentiality, data integrity and data origin authentication on your network?A . Certificate AuthorityB . IKEC . IPSecD . Data Encryption StandardsView AnswerAnswer: C

April 10, 2018 No Comments READ MORE +

All ports on switch 1 have a primary VLAN of 300. Which devices can host 1 reach?

Refer to the exhibit. All ports on switch 1 have a primary VLAN of 300. Which devices can host 1 reach?A . Host 2B . ServerC . Host 4D . Other devices within VLAN 303View AnswerAnswer: B

April 4, 2018 No Comments READ MORE +

Which of the following statements about access lists are true? (Choose three.)

Which of the following statements about access lists are true? (Choose three.)A . Extended access lists should be placed as near as possible to the destinationB . Extended access lists should be placed as near as possible to the sourceC . Standard access lists should be placed as near as...

April 4, 2018 No Comments READ MORE +

Which type of encryption technology has the broadest platform support to protect operating systems?

Which type of encryption technology has the broadest platform support to protect operating systems?A . softwareB . hardwareC . middlewareD . file-levelView AnswerAnswer: A

April 3, 2018 No Comments READ MORE +

For which reason is the tunnel unable to pass traffic?

Refer to the exhibit. For which reason is the tunnel unable to pass traffic?A . UDP port 500 is blocked.B . The IP address of the remote peer is incorrect.C . The tunnel is failing to receive traffic from the remote peer.D . The local peer is unable to encrypt...

April 3, 2018 No Comments READ MORE +

Which address block is reserved for locally assigned unique local addresses?

Which address block is reserved for locally assigned unique local addresses?A . 2002::/16B . FD00::/8C . 2001::/32D . FB00::/8View AnswerAnswer: B

April 1, 2018 No Comments READ MORE +

Which FirePOWER preprocessor engine is used to prevent SYN attacks?

Which FirePOWER preprocessor engine is used to prevent SYN attacks?A . Rate-Based PreventionB . Portscan DetectionC . IP DefragmentationD . Inline NormalizationView AnswerAnswer: A

April 1, 2018 No Comments READ MORE +

What is example of social engineering

What is example of social engineeringA . Gaining access to a building through an unlocked door.B . something about inserting a random flash drive.C . gaining access to server room by posing as ITD . Watching other user put in username and password (something around there)View AnswerAnswer: C

March 31, 2018 No Comments READ MORE +

Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)

Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)A . start-stopB . stop-recordC . stop-onlyD . stopView AnswerAnswer: A,C

March 31, 2018 No Comments READ MORE +

Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)

Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)A . Port securityB . DHCP snoopingC . IP source guardD . Dynamic ARP inspectionView AnswerAnswer: B,D

March 30, 2018 No Comments READ MORE +