Category: Network Security 1.0
Network Security (Version 1.0) Modules 18 – 19: VPNs Group Exam Answers 1. Which two statements describe the IPsec protocol framework? (Choose two.) AH uses IP protocol 51. AH provides integrity and authentication. AH provides encryption and integrity. ESP uses UDP protocol 51. AH provides both authentication and …
Network Security (Version 1.0) Modules 15 – 17: Cryptography Group Exam Answers 1. Which algorithm can ensure data integrity? RSA AES MD5 PKI 2. What is the keyspace of an encryption algorithm? the set of all possible values used to generate a key the set of procedures used …
Network Security (Version 1.0) Modules 13 – 14: Layer 2 and Endpoint Security Group Exam Answers 1. Why are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices? These devices are not managed by the corporate IT department. These devices pose no risk to …
Modules 11 – 12: Intrusion Prevention Group Exam Network Security ( Version 1) – Network Security 1.0 Modules 11-12: Intrusion Prevention Group Exam Answers 1. What are two characteristics of both IPS and IDS sensors? (Choose two.) neither introduce latency or jitter both use signatures to detect patterns …
Modules 8 – 10: ACLs and Firewalls Group Exam Network Security (Version 1) – Network Security 1.0 Modules 8-10: ACLs and Firewalls Group Exam Answers 1. When creating an ACL, which keyword should be used to document and interpret the purpose of the ACL statement on a Cisco …
Modules 5 – 7: Monitoring and Managing Devices Group Exam Network Security ( Version 1) – Network Security Modules 5-7: Monitoring and Managing Devices Group Exam Answers 1. Which privilege level is predefined for the privileged EXEC mode? level 0 level 1 level 15 level 16 2. What …
Modules 1 – 4: Securing Networks Group Exam Answers Network Security ( Version 1) – Network Security 1.0 Modules 1-4: Securing Networks Group Exam Answers 1. An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps …
1. Each day, a security analyst spends time examining logs and events from different systems and applications to quickly detect security threats. What function of the Security Information Event Management (SIEM) technology does this action represent? aggregation correlation retention forensic analysis 2. Which network security tool can detect …
1. Which two statements are true about ASA standard ACLs? (Choose two.) They identify only the destination IP address. They are the most common type of ACL. They are applied to interfaces to control traffic. They specify both the source and destination MAC address. They are typically only …
1. What is a characteristic of ASA security levels? An ACL needs to be configured to explicitly permit traffic from an interface with a lower security level to an interface with a higher security level. Each operational interface must have a name and be assigned a security level …