Which security zone is automatically defined by the system?
Which security zone is automatically defined by the system?A . The source zoneB . The self zoneC . The destination zoneD . The inside zoneView AnswerAnswer: B
A data breach has occurred and your company database has been copied. Which security principle has been violated?
A data breach has occurred and your company database has been copied. Which security principle has been violated?A . confidentialityB . availabilityC . accessD . controlView AnswerAnswer: A
Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?
Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?A . Unidirectional Link DetectionB . Unicast Reverse Path ForwardingC . TrustSecD . IP Source GuardView AnswerAnswer: B
What is the Cisco preferred countermeasure to mitigate CAM overflows?
What is the Cisco preferred countermeasure to mitigate CAM overflows?A . Port securityB . Dynamic port securityC . IP source guardD . Root guardView AnswerAnswer: B
Which Cisco product can help mitigate web-based attacks within a network?
Which Cisco product can help mitigate web-based attacks within a network?A . Adaptive Security ApplianceB . Web Security ApplianceC . Email Security ApplianceD . Identity Services EngineView AnswerAnswer: B
Which product can be used to provide application layer protection for TCP port 25 traffic?
Which product can be used to provide application layer protection for TCP port 25 traffic?A . ESAB . CWSC . WSAD . ASAView AnswerAnswer: A
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)A . TACACS uses TCP to communicate with the NAC . TACACS can encrypt the entire packet that is sent to the NAE . TACACS supports per-command authorization.F . TACACS authenticates and authorizes simultaneously, causing fewer packets to...
Which statement about college campus is true?
Which statement about college campus is true?A . College campus has geographical position.B . College campus Hasn`t got internet access.C . College campus Has multiple subdomains.View AnswerAnswer: A
Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)
Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)A . Modifying packetsB . Requesting connection blockingC . Denying packetsD . Resetting the TCP connectionE . Requesting host blockingF . Denying framesView AnswerAnswer: B,D,E
With which technology do apply integrity, confidentially and authenticate the source
With which technology do apply integrity, confidentially and authenticate the sourceA . IPSecB . IKEC . Certificate authorityD . Data encryption standardsView AnswerAnswer: A