Which security zone is automatically defined by the system?

Which security zone is automatically defined by the system?A . The source zoneB . The self zoneC . The destination zoneD . The inside zoneView AnswerAnswer: B

March 20, 2018 No Comments READ MORE +

A data breach has occurred and your company database has been copied. Which security principle has been violated?

A data breach has occurred and your company database has been copied. Which security principle has been violated?A . confidentialityB . availabilityC . accessD . controlView AnswerAnswer: A

March 16, 2018 No Comments READ MORE +

Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?

Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?A . Unidirectional Link DetectionB . Unicast Reverse Path ForwardingC . TrustSecD . IP Source GuardView AnswerAnswer: B

March 16, 2018 No Comments READ MORE +

What is the Cisco preferred countermeasure to mitigate CAM overflows?

What is the Cisco preferred countermeasure to mitigate CAM overflows?A . Port securityB . Dynamic port securityC . IP source guardD . Root guardView AnswerAnswer: B

March 14, 2018 No Comments READ MORE +

Which Cisco product can help mitigate web-based attacks within a network?

Which Cisco product can help mitigate web-based attacks within a network?A . Adaptive Security ApplianceB . Web Security ApplianceC . Email Security ApplianceD . Identity Services EngineView AnswerAnswer: B

March 12, 2018 No Comments READ MORE +

Which product can be used to provide application layer protection for TCP port 25 traffic?

Which product can be used to provide application layer protection for TCP port 25 traffic?A . ESAB . CWSC . WSAD . ASAView AnswerAnswer: A

March 12, 2018 No Comments READ MORE +

In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)

In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)A . TACACS uses TCP to communicate with the NAC . TACACS can encrypt the entire packet that is sent to the NAE . TACACS supports per-command authorization.F . TACACS authenticates and authorizes simultaneously, causing fewer packets to...

March 12, 2018 No Comments READ MORE +

Which statement about college campus is true?

Which statement about college campus is true?A . College campus has geographical position.B . College campus Hasn`t got internet access.C . College campus Has multiple subdomains.View AnswerAnswer: A

March 11, 2018 No Comments READ MORE +

Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)

Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)A . Modifying packetsB . Requesting connection blockingC . Denying packetsD . Resetting the TCP connectionE . Requesting host blockingF . Denying framesView AnswerAnswer: B,D,E

March 11, 2018 No Comments READ MORE +

With which technology do apply integrity, confidentially and authenticate the source

With which technology do apply integrity, confidentially and authenticate the sourceA . IPSecB . IKEC . Certificate authorityD . Data encryption standardsView AnswerAnswer: A

March 10, 2018 No Comments READ MORE +