Category: Network Security 1.0
1. What is one benefit of using a next-generation firewall rather than a stateful firewall? reactive protection against Internet threats support of TCP-based packet filtering support of logging integrated use of an intrusion prevention system (IPS) 2. Which three layers of the OSI model include information that is …
1. In applying an ACL to a router interface, which traffic is designated as outbound? traffic that is coming from the source IP address into the router traffic that is going from the destination IP address into the router traffic that is leaving the router and going toward …
1. What is a feature of the TACACS+ protocol? It combines authentication and authorization as one process. It encrypts the entire body of the packet for more secure communications. It hides passwords during transmission using PAP and sends the rest of the packet in plaintext. It utilizes UDP …
1. What service or protocol does the Secure Copy Protocol rely on to ensure that secure copy transfers are from authorized users? AAA RADIUS IPsec SNMP 2. When password recovery on a router is being performed and the settings in NVRAM have been bypassed, which step should be …
1. What must be done before any role-based CLI views can be created? Assign multiple privilege levels. Configure usernames and passwords. Issue the aaa new-model command. Create the secret password for the root user. 2. Which three statements describe limitations in using privilege levels for assigning command authorization? …
1. At what point in the enterprise network are packets arriving from the internet examined prior to entering the network? campus core internet edge network edge WAN edge 2. What three configuration steps must be performed to implement SSH access to a router? (Choose three.) a password on …
1. What is the primary means for mitigating virus and Trojan horse attacks? blocking ICMP echo and echo-replies encryption antisniffer software antivirus software 2. What three items are components of the CIA triad? (Choose three.) availability integrity scalability intervention confidentiality access 3. Which security implementation will provide control …
1. In what way are zombies used in security attacks? They probe a group of machines for open ports to learn which services are running. They target specific individuals to gain corporate or personal information. They are infected machines that carry out a DDoS attack. They are maliciously …
1. Which security measure is typically found both inside and outside a data center facility? a gate biometrics access exit sensors security traps continuous video surveillance 2. Which statement accurately characterizes the evolution of threats to network security? Threats have become less sophisticated while the technical knowledge needed …