By which kind of threat is the victim tricked into entering username and password information at a disguised website?
By which kind of threat is the victim tricked into entering username and password information at a disguised website?A . SpoofingB . MalwareC . SpamD . PhishingView AnswerAnswer: D Explanation: Phishing presents a link that looks like a valid trusted resource to a user. When the user clicks it, the...
What is the effect of the given command sequence?
Refer to the exhibit. What is the effect of the given command sequence?A . It configures IKE Phase 1.B . It configures a site-to-site VPN tunnel.C . It configures a crypto policy with a key size of 14400.D . It configures IPSec Phase 2.View AnswerAnswer: A Explanation: Configure the IPsec...
Which statement about personal firewalls is true?
Which statement about personal firewalls is true?A . They can protect a system by denying probing requests.B . They are resilient against kernel attacks.C . They can protect email messages and private documents in a similar way to a VPE . They can protect the network against attacks.View AnswerAnswer: A...
What command can you use to verify the binding table status?
What command can you use to verify the binding table status?A . show ip dhcp snooping databaseB . show ip dhcp snooping bindingC . show ip dhcp snooping statisticsD . show ip dhcp poolE . show ip dhcp source bindingF . show ip dhcp snoopingView AnswerAnswer: B Explanation: A device's...
If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?
Refer to the exhibit. If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?A . The supplicant will fail to advance beyond the webauth method.B . The switch will cycle through the configured authentication methods indefinitely.C . The authentication attempt will...
Which protocol provides security to Secure Copy?
Which protocol provides security to Secure Copy?A . IPsecB . SSHC . HTTPSD . ESPView AnswerAnswer: B Explanation: The SCP is a network protocol, based on the BSD RCP protocol,[3] which supports file transfers between hosts on a network. SCP uses Secure Shell (SSH) for data transfer and uses the...
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)A . AESB . 3DESC . DESD . MD5E . DH-1024F . SHA-384View AnswerAnswer: A,F Explanation: The Suite B next-generation encryption (NGE) includes algorithms for authenticated encryption, digital signatures, key establishment, and cryptographic hashing, as listed here: + Elliptic Curve Cryptography...
connection?
What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?A . split tunnelingB . hairpinningC . tunnel modeD . transparent modeView AnswerAnswer: A Explanation: Split tunneling is a computer networking concept which allows a mobile user to access dissimilar security domains like a public...
does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPsec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPsec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPsec Phase 1 is down due to...
CORRECT TEXT
CORRECT TEXT Scenario Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. New additional connectivity requirements: Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram. To access...