Author: IT Administrator

CCNA Cyber Ops (Version 1.1) – Chapter 8 Exam Answers Full

1. With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach? Artichoke * Lettuce Onion Cabbage 2. What is a characteristic of a layered defense-in-depth security approach? Three or more devices are used. Routers are replaced with firewalls. When one device fails, …

CCNA Cyber Ops (Version 1.1) – Chapter 7 Exam Answers Full

1. Which technology is a proprietary SIEM system? SNMP agent Splunk * Stealthwatch NetFlow collector 2. Which term is used to describe legitimate traffic that is mistaken for unauthorized traffic by firewalls and IPSs? True positive True negative False positive * False negative 3. Which monitoring technology mirrors …

CCNA Cyber Ops (Version 1.1) – Chapter 5 Exam Answers Full

1. What specialized network device is responsible for enforcing access control policies between networks? Bridge Switch Firewall IDS 2. What information does an Ethernet switch examine and use to build its address table? Source IP address Destination IP address Source MAC address Destination MAC address 3. Which device …