Category: Network Security 1.0
1. Which statement describes STP? STP is a Layer 2 routing protocol. STP is a Layer 3 routing protocol for Ethernet LANs. STP is a Layer 2 loop prevention protocol for Ethernet LANs. STP is a Layer 3 loop prevention protocol for IP networks. 2. Without STP on …
1. What type of attack occurs when a threat actor sends packets with false MAC or IP addresses? VLAN attacks address spoofing DHCP attacks ARP attacks 2. What prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks? IP Source Guard (IPSG) DHCP Snooping …
1. What prevents endpoints from connecting with websites that have a bad reputation based on the latest reputation intelligence? blocklisting spam filtering data loss prevention antimalware software 2. What protects endpoints from malicious software? blocklisting spam filtering data loss prevention antimalware software 3. What prevents sensitive information from …
1. Which type of file contains a compressed, installable version of the Snort IPS virtual machine? BIN EXE OVA VPG 2. Which Snort IPS interface statement is true? One loopback interface is required Two ethernet interfaces are required Two virtual port group interfaces are required Two VLAN interfaces
1. What are the three actions supported by Snort IDS? (Choose three.) Alert Drop Log Pass Reject Sdrop 2. Which two options are components of Snort IPS that is running on an ISR 4000? (Choose two.) Snort action Snort alarm Snort engine Snort rule set
1. Which action logs the IP address from a malicious source only and sends an alert? request block host drop or prevent the activity log attacker packets deny connection inline reset a TCP connection 2. Which action terminates a malicious packet only? request drop host request block trap …
1. Snort IPS is available on which router platform? Cisco 800 Cisco 1800 Cisco 2900 Cisco 4000 2. Where does the Snort engine run? DRAM NVRAM service container 3. In which operating mode does Snort IDS inspect traffic and report alerts, but does not take any action to …
1. True or False? A HIPS can be configured in either promiscuous or inline mode. True False 2. What is true of a NIPS that is running in inline mode? It can not stop malicious traffic from reaching its destination. NIPS post-event responses require assistance from other networking …
1. Which network security design typically uses one inside interface, one outside interface, and one DMZ interface? layered defense public demilitarized two-interface firewall ZPF 2. Which security design uses different types of firewalls and security measures that are combined at different areas of the network to add depth …
1. Which type of firewall filters information at Layers 3, 4, 5, and 7 of the OSI reference model? Host-based Hybrid Application gateway Packet filtering Stateful 2. Which type of firewall is a combination of various firewall types? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent 3. …