Check answers here:
Network Security 1.0 Practice Final Exam Answers
Quiz-summary
0 of 64 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
Information
Network Security (Version1.0) Practice Final Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 64 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- Answered
- Review
-
Question 1 of 64
1. Question
1 pointsWhich two statements are true about ASA standard ACLs? (Choose two.)Correct
Incorrect
Hint
ASA standard ACLs are used to identify the destination IP addresses, unlike IOS ACLs where a standard ACL identifies the source host/network. They are typically only used for OSPF routes and can be used in a route map for OSPF redistribution. Standard access lists cannot be applied to interfaces to control traffic. -
Question 2 of 64
2. Question
1 pointsWhen dynamic NAT on an ASA is being configured, what two parameters must be specified by network objects? (Choose two.)Correct
Incorrect
Hint
On an ASA, both the pool of addresses that will be used as inside global address and the range of internal private addresses that should be translated are configured through network objects. -
Question 3 of 64
3. Question
1 pointsWhich protocol uses X.509 certificates to support mail protection performed by mail agents?Correct
Incorrect
Hint
Many applications use the X.509 standard format of digital certificates to authenticate websites, public key distribution, and end devices connected to switch ports. User email agents use the S/MIME protocol to support email protection. S/MIME uses X.509 certificates. -
Question 4 of 64
4. Question
1 pointsWhat are two security features commonly found in a WAN design? (Choose two.)Correct
Incorrect
Hint
WANs span a wide area and commonly have connections from a main site to remote sites including a branch office, regional site, SOHO sites, and mobile workers. WANs typically connect over a public internet connection. Each site commonly has a firewall and VPNs used by remote workers between sites. -
Question 5 of 64
5. Question
1 pointsWhat is an appropriate use for class 5 digital certificates?Correct
Incorrect
Hint
The CA class number determines how rigorous the procedure was that verified the identity of the holder when the certificate was issued. The higher the class number, the more trusted the certificate. Class numbers range from 0 to 5. A class 5 certificate is the most trusted, and class 0 the least trusted. Class 5 is used for private organizations or government security. -
Question 6 of 64
6. Question
1 pointsWhich two statements are characteristics of a virus? (Choose two.)Correct
Incorrect
Hint
The type of end user interaction required to launch a virus is typically opening an application, opening a web page, or powering on the computer. Once activated, a virus may infect other files located on the computer or other computers on the same network. -
Question 7 of 64
7. Question
1 pointsMatch the information security component with the description.Correct
Incorrect
-
Question 8 of 64
8. Question
1 pointsMatch the security policy with the description. (Not all options are used.)Correct
Incorrect
-
Question 9 of 64
9. Question
1 pointsHow does the service password-encryption command enhance password security on Cisco routers and switches?Correct
Incorrect
Hint
The service password-encryption command encrypts plaintext passwords in the configuration file so that they cannot be viewed by unauthorized users. -
Question 10 of 64
10. Question
1 pointsWhich benefit does SSH offer over Telnet for remotely managing a router?Correct
Incorrect
Hint
SSH provides secure access to a network device for remote management. It uses a stronger password authorization than Telnet does and encrypts any data that is transported during the session. -
Question 11 of 64
11. Question
1 pointsRefer to the exhibit. Which statement about the JR-Admin account is true?Correct
Incorrect
Hint
When the username name privilege 10 command is issued, access to commands with a privilege level of 10 or less (0-10) is permitted to the user. -
Question 12 of 64
12. Question
1 pointsWhat protocol is used by SCP for secure transport?Correct
Incorrect
Hint
The Secure Copy (SCP) feature provides a secure and authenticated method for copying and saving router configuration files by using SSH. -
Question 13 of 64
13. Question
1 pointsRefer to the exhibit. What type of syslog message is displayed?Correct
Incorrect
Hint
The severity level is used to provide an explanation for the event or error that is occurring within the Cisco IOS. The smaller the number of the severity level, the more critical the event. A Syslog message with a level 5 is considered a notification message. -
Question 14 of 64
14. Question
1 pointsWhat command must be issued on a Cisco router that will serve as an authoritative NTP server?Correct
Incorrect
Hint
Routers that will serve as NTP masters must be configured with the ntp master command. A client is configured with the ntp server command so that the client can locate the NTP master. The ntp broadcast client command allows NTP to use to broadcast messages. The clock set command is used to set the time on a router. -
Question 15 of 64
15. Question
1 pointsA server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?Correct
Incorrect
Hint
Accounting records what users do and when they do it, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Accounting keeps track of how network resources are used. -
Question 16 of 64
16. Question
1 pointsWhich three types of views are available when configuring the role-based CLI access feature? (Choose three.)Correct
Incorrect
Hint
There are three types of Role-based CLI views:- root view
- CLI view
- superview
-
Question 17 of 64
17. Question
1 pointsWhat is the purpose of using the ip ospf message-digest-key key md5 password command and the area area-id authentication message-digest command on a router?Correct
Incorrect
Hint
To configure OSPF MD5 authentication globally, the ip ospf message-digest-key key md5 password interface configuration command and the area area-id authentication message-digest router configuration command are issued. To configure OSPF MD5 authentication per interface, the ip ospf message-digest-key key md5 password interface configuration command and the ip ospf authentication message-digest interface configuration command are issued. Authentication does not encrypt OSPF routing updates. The requirements to establish OSPF router neighbor adjacencies are separate from authentication. -
Question 18 of 64
18. Question
1 pointsWhat is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence?Correct
Incorrect
Hint
The use of the local-case keyword means that the authentication is case-sensitive. It does not enable or apply the AAA configuration to router interfaces or lines. -
Question 19 of 64
19. Question
1 pointsA network administrator is configuring an AAA server to manage RADIUS authentication. Which two features are included in RADIUS authentication? (Choose two.)Correct
Incorrect
Hint
RADIUS authentication supports the following features:- RADIUS authentication and authorization as one process
- Encrypts only the password
- Utilizes UDP
- Supports remote-access technologies, 802.1X, and Session Initiation Protocol (SIP)
-
Question 20 of 64
20. Question
1 pointsA network administrator is explaining to a junior colleague the use of the lt and gt keywords when filtering packets using an extended ACL. Where would the lt or gt keywords be used?Correct
Incorrect
Hint
The lt and gt keywords are used for defining a range of port numbers that are less than a particular port number or greater than a particular port number. -
Question 21 of 64
21. Question
1 pointsWhich feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs?Correct
Incorrect
Hint
One of the major differences between IPv6 and IPv4 ACLs are two implicit permit statements at the end of any IPv6 ACL. These two permit statements allow neighbor discovery operations to function on the router interface. -
Question 22 of 64
22. Question
1 pointsRefer to the exhibit. An extended access list has been created to prevent human resource users from gaining access to the accounting server. All other network traffic is to be permitted. When following the ACL configuration guidelines, on which router, interface, and direction should the access list be applied?Correct
Incorrect
Hint
The ACL configuration guidelines recommend placing extended access control lists as close to the source of network traffic as possible and placing standard access control lists as close to the destination of network traffic as possible. -
Question 23 of 64
23. Question
1 pointsWhich statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?Correct
Incorrect
Hint
Packet filtering firewalls can always filter Layer 3 content and sometimes TCP and UDP-based content. Stateful firewalls monitor connections and thus have to be able to support up to the session layer of the OSI model. -
Question 24 of 64
24. Question
1 pointsWhich special hardware module, when integrated into ASA, provides advanced IPS features?Correct
Incorrect
Hint
The advanced threat control and containment services of an ASA firewall are provided by integrating special hardware modules with the ASA architecture. These special modules include:- Advanced Inspection and Prevention (AIP) module – supports advanced IPS capability.
- Content Security and Control (CSC) module – supports antimalware capabilities.
- Cisco Advanced Inspection and Prevention Security Services Module (AIP-SSM) and Cisco Advanced Inspection and Prevention Security Services Card (AIP-SSC) – support protection against tens of thousands of known exploits.
-
Question 25 of 64
25. Question
1 pointsRefer to the exhibit. A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces?Correct
Incorrect
Hint
The Cisco ASA assigns security levels to distinguish among different networks it connects. Security levels define the level of trustworthiness of an interface. The higher the level, the more trusted the interface. The security level numbers range between 0 (untrustworthy) to 100 (very trustworthy). Therefore, the interface connecting to the Internet should be assigned the lowest level. The interface connecting to the internal network should be assigned the highest level. The interface connecting to the DMZ network should be assigned a level between them. -
Question 26 of 64
26. Question
1 pointsWhat is an advantage in using a packet filtering firewall versus a high-end firewall appliance?Correct
Incorrect
Hint
There are several advantages of using a packet filtering firewall:- allows for implementing simple permit or deny rule sets.
- has a low impact on network performance
- is easy to implement, and is supported by most routers
- provides an initial degree of security at the network layer
- performs almost all the tasks of a high-end firewall at a much lower cost
-
Question 27 of 64
27. Question
1 pointsWhich type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 and Layer 4 information?Correct
Incorrect
Hint
A stateless firewall uses a simple policy table look-up that filters traffic based on specific criteria. These firewalls are usually part of a router firewall. They permit or deny traffic based on Layer 3 and Layer 4 information. -
Question 28 of 64
28. Question
1 pointsA company is deploying a new network design in which the border router has three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01 connects to the internal private network. Which type of traffic would receive the least amount of inspection (have the most freedom of travel)?Correct
Incorrect
Hint
Most traffic within an organization originates from a private IP address. The amount of inspection done to that traffic depends on its destination or whether traffic that is going to that private IP address originated the connection. The demilitarized zone typically holds servers. Traffic that is destined to those servers is filtered based on what services are being provided by the server (HTTP, HTTPS, DNS, etc.). -
Question 29 of 64
29. Question
1 pointsWhat are two benefits offered by a zone-based policy firewall on a Cisco router? (Choose two.)Correct
Incorrect
Hint
There are several benefits of a ZPF:- It is not dependent on ACLs.
- The router security posture is to block unless explicitly allowed.
- Policies are easy to read and troubleshoot. This provides scalability because one policy affects any given traffic, instead of needing multiple ACLs and inspection actions for different types of traffic.
- Virtual and physical interfaces can be grouped into zones.
- Policies are applied to unidirectional traffic between zones.
- Both IOS Classic Firewalls and ZPFs can be enabled concurrently on a Cisco router.
- However, the models cannot be combined on a single interface
-
Question 30 of 64
30. Question
1 pointsWhen a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created?Correct
Incorrect
Hint
The steps for configuring zones in a Zone-Based Policy Firewall are as follows:- Step 1. Determine the zones.
- Step 2. Establish policies between zones.
- Step 3. Design the physical infrastructure.
- Step 4. Identify subsets within zones and merge traffic requirements.
-
Question 31 of 64
31. Question
1 pointsWhat are two shared characteristics of the IDS and the IPS? (Choose two.)Correct
Incorrect
Hint
Both the IDS and the IPS are deployed as sensors and use signatures to detect malicious traffic. The IDS analyzes copies of network traffic, which results in minimal impact on network performance. The IDS also relies on an IPS to stop malicious traffic. -
Question 32 of 64
32. Question
1 pointsWhen a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)Correct
Incorrect
Hint
The three actions that can be applied are inspect, drop,and pass.- Inspect – This action offers state-based traffic control.
- Drop – This is the default action for all traffic. Similar to the implicit deny any at the end of every ACL, there is an explicit drop applied by the IOS to the end of every policy map.
- Pass – This action allows the router to forward traffic from one zone to another.
-
Question 33 of 64
33. Question
1 pointsMatch the network security device type with the description.Correct
Incorrect
-
Question 34 of 64
34. Question
1 pointsWhat is a characteristic of an IPS atomic signature?Correct
Incorrect
Hint
There are two types of IPS signatures:- Atomic – This is the simplest type of signature because it does not require the IPS to maintain state information and it can identify an attack with a single packet, activity, or event.
- Composite – This is a stateful type of signature. It requires that the IPS maintain state information to match an attack signature.
-
Question 35 of 64
35. Question
1 pointsMatch each IPS signature trigger category with the description.Correct
Incorrect
-
Question 36 of 64
36. Question
1 pointsA company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops?Correct
Incorrect
Hint
Storage devices can be encrypted to protect data from unauthorized access. Windows BitLocker provides drive encryption. -
Question 37 of 64
37. Question
1 pointsWhat protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?Correct
Incorrect
Hint
Encapsulation of EAP data between the authenticator and the authentication server is performed using RADIUS. -
Question 38 of 64
38. Question
1 pointsA company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated?Correct
Incorrect
Hint
802.1X prevents unauthorized devices from gaining access to the network. The authentication port-control auto command turns on 802.1X access control. Until the client is authenticated, 802.1X only allows Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic to pass through the port. EAPOL messages are sent between the client and the authenticator such as a switch. If authentication is successful, normal traffic can be sent and received through the port. -
Question 39 of 64
39. Question
1 pointsWhich two security features can cause a switch port to become error-disabled? (Choose two.)Correct
Incorrect
Hint
Error-disabled mode is a way for a switch to automatically shut down a port that is causing problems, and usually requires manual intervention from an administrator to restore the port. When port security is configured to use the shutdown violation mode, it will put the port into the error-disabled mode when the maximum number of MAC addresses is exceeded. Likewise, BPDU guard will put the port into error-disabled mode if a BPDU arrives on a PortFast enabled interface. Storm control will only put the port into the error-disabled mode when configured with the shutdown option. The trap option will simply create an SNMP log message. -
Question 40 of 64
40. Question
1 pointsWhat are three techniques for mitigating VLAN hopping attacks? (Choose three.)Correct
Incorrect
Hint
Mitigating a VLAN hopping attack can be done by disabling Dynamic Trunking Protocol (DTP), manually setting ports to trunking mode, and by setting the native VLAN of trunk links to VLANs not in use. -
Question 41 of 64
41. Question
1 pointsRefer to the exhibit. A network administrator is configuring DAI on switch SW1. What is the result of entering the exhibited commands?Correct
Incorrect
Hint
DAI can be configured to check for destination MAC, source MAC, and IP addresses. However, only one ip arp inspection validate command can be configured. Entering multiple ip arp inspection validate commands overwrites the previous command. -
Question 42 of 64
42. Question
1 pointsDuring a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential?Correct
Incorrect
Hint
MD5 and SHA are hash-generating algorithms that guarantee that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source. -
Question 43 of 64
43. Question
1 pointsWhich cipher played a significant role in World War II?Correct
Incorrect
Hint
The Enigma machine was an electromechanical encryption device that created the Enigma cipher and was developed during World War II. The device depended on the distribution of pre-shared keys that were used to encrypt and decrypt messages. -
Question 44 of 64
44. Question
1 pointsOne method used by Cryptanalysts to crack codes is based on the fact that some letters of the English language are used more often than others. Which term is used to describe this method?Correct
Incorrect
Hint
Frequency analysis uses the fact that some characters in the English alphabet are used more often than others. The letters E, T, and A are the most popular letters and J, Q, X, and Z are the least popular. -
Question 45 of 64
45. Question
1 pointsWhy are DES keys considered weak keys?Correct
Incorrect
Hint
Weak keys, whether part of an existing encryption algorithm or manually generated, reveal regularities in encryption. This creates a shortcut by which a hacker can break the encryption. DES has four keys for which encryption is identical to decryption. -
Question 46 of 64
46. Question
1 pointsRefer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group name SERVICE1 ?Correct
Incorrect
Hint
Because this is a service object group, the keyword should indicate which protocol is used. The options are tcp, udp, tcp-udp, icmp, and icmpv6. The subsequent commands indicate that the services in the group are WWW, FTP, and SMTP. Because all of these protocols use TCP, the keyword in the service object group should be tcp . -
Question 47 of 64
47. Question
1 pointsIn the implementation of network security, how does the deployment of a Cisco ASA firewall differ from a Cisco IOS router?Correct
Incorrect
Hint
The differences between ASA devices and Cisco IOS routers include the following:- An ASA device configured with ACLs is configured with a subnet mask.
- An ASA device supports interface security levels.
- An ASA device configured with an ACL is always named.
- ASA devices and Cisco IOS routers are similar in that they both support an implicit deny within an ACL.
-
Question 48 of 64
48. Question
1 pointsRefer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next?Correct
Incorrect
Hint
The nat (inside,outside) dynamic interface command indicates that inside hosts are overloading the outside address of the mapped interface. -
Question 49 of 64
49. Question
1 pointsWhat type of network security test uses simulated attacks to determine the feasibility of an attack as well as the possible consequences if the attack occurs?Correct
Incorrect
Hint
There are many tests that are used by security specialists to assess the status of a system. They include the following:- penetration testing to determine the feasibility of attacks
- network scanning to scan for and identify open TCP ports
- integrity checking to check for changes that have occurred in the system
- vulnerability scanning to detect potential weaknesses in systems
-
Question 50 of 64
50. Question
1 pointsWhat three tasks can a network administrator accomplish with the Nmap and Zenmap security testing tools? (Choose three.)Correct
Incorrect
Hint
Nmap is a low-level network scanner that is available to the public and that has the ability to perform port scanning, to identify open TCP and UDP ports, and which can also perform system identification. It can also be used to identify Layer 3 protocols that are running on a system. Zenmap is the GUI version of Nmap. -
Question 51 of 64
51. Question
1 pointsMatch the network security testing tool with the correct function. (Not all options are used.)Correct
Incorrect
-
Question 52 of 64
52. Question
1 pointsWhich two means can be used to try to bypass the management of mobile devices? (Choose two.)Correct
Incorrect
Hint
Jailbreaking is a term used when breaking into an Apple iOS device, whereas rooting is the term used for doing the same to an Android device. Both must be concerns in the corporate environment where so many people bring their own devices and access the corporate networks. -
Question 53 of 64
53. Question
1 pointsMatch the type of cyberattackers to the description. (Not all options are used.)Correct
Incorrect
-
Question 54 of 64
54. Question
1 pointsWhat is a benefit of having users or remote employees use a VPN to connect to the existing network rather than growing the network infrastructure?Correct
Incorrect
Hint
A benefit of VPNs is scalability because organizations can use the Internet and easily add new users without adding significant infrastructure. Security is provided by using encryption and authentication protocols to protect data. Another benefit is compatibility because VPNs can be implemented across a wide variety of WAN connections. Organizations also benefit from cost savings because VPNs reduce connectivity costs while simultaneously increasing remote connection bandwidth. -
Question 55 of 64
55. Question
1 pointsWhat is a difference between symmetric and asymmetric encryption algorithms?Correct
Incorrect
Hint
Asymmetric algorithms can use very long key lengths in order to avoid being hacked. This results in the use of significantly increased resources and time compared to symmetric algorithms. -
Question 56 of 64
56. Question
1 pointsWhat technology allows users to verify the identity of a website and to trust code that is downloaded from the Internet?Correct
Incorrect
Hint
Digital signatures provide assurance of the authenticity and integrity of software codes. They provide the ability to trust code that is downloaded from the Internet. -
Question 57 of 64
57. Question
1 pointsWhich two statements correctly describe certificate classes used in the PKI? (Choose two.)Correct
Incorrect
Hint
A digital certificate class is identified by a number. The higher the number, the more trusted the certificate. The classes include the following:Class 0 is for testing purposes in which no checks have been performed.- Class 1 is for individuals with a focus on verification of email.
- Class 2 is for organizations for which proof of identity is required.
- Class 3 is for servers and software signing for which independent verification and checking of identity and authority is done by the issuing certificate authority.
- Class 4 is for online business transactions between companies.
- Class 5 is for private organizations or governmental security.
-
Question 58 of 64
58. Question
1 pointsWhat is the standard for a public key infrastructure to manage digital certificates?Correct
Incorrect
Hint
The x.509 standard is for a PKI infrastructure and x.500 if for directory structures. -
Question 59 of 64
59. Question
1 pointsWhich two statements describe remote access VPNs? (Choose two.)Correct
Incorrect
Hint
Remote access VPNs are designed to provide for the needs of telecommuters and mobile users through the use of software that is installed on the client to encrypt and encapsulate the data. Remote access VPNs can be used across a variety of WAN connections. Users must access the client software to initiate the VPN connection. -
Question 60 of 64
60. Question
1 pointsWhat are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)Correct
Incorrect
Hint
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to ensure that data is not intercepted and modified (data integrity and authenticity) are MD5 and SHA. -
Question 61 of 64
61. Question
1 pointsWhat is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?Correct
Incorrect
Hint
A crypto ACL can define “interesting traffic” that is used to build a VPN, and forward that “interesting traffic” across the VPN to another VPN-enabled router. Multiple crypto ACLs are used to define multiple different types of traffic and utilize different IPsec protection corresponding to the different types of traffic. -
Question 62 of 64
62. Question
1 pointsRefer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C?Correct
Incorrect
Hint
ASA protects Network/Zone C (Inside) from unauthorized access by users on a Network/Zone B (Outside). It also denies traffic from Network/Zone A (DMZ) to access the Network/Zone C (Inside). -
Question 63 of 64
63. Question
1 pointsWhat are two monitoring tools that capture network traffic and forward it to network monitoring devices? (Choose two.)Correct
Incorrect
Hint
A network tap is used to capture traffic for monitoring the network. The tap is typically a passive splitting device implemented inline on the network and forwards all traffic including physical layer errors to an analysis device. SPAN is a port mirroring technology supported on Cisco switches that enables the switch to copy frames and forward them to an analysis device. -
Question 64 of 64
64. Question
1 pointsWhat is the IPS detection engine that is included in the SEC license for 4000 Series ISRs?Correct
Incorrect
Hint
Snort is the IPS detection and enforcement engine that is included in the SEC license for 4000 Series ISRs.