Category: Network Security 1.0
1. Which ACL is capable of filtering based on TCP port number? extended ACL standard ACL 2. Which statement about ACLs is true? Extended ACLs are numbered 1300 – 2699. Named ACLs can be standard or extended. Numbered ACLs is the preferred method to use when configuring ACLs. …
1. Which wildcard mask would permit only host 10.10.10.1? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 2. Which wildcard mask would permit only hosts from the 10.10.0.0/16 network? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 3. Which wildcard mask would permit all hosts? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 4. Which wildcard mask …
1. Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made. Authentication Authorization Accounting 2. Uses a created set of attributes that describes the user’s access to the network. Authentication Authorization Accounting 3. Established using …
1. Refer to the following syslog output to answer the questions. *Jun 12 17:46:01.619: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory Refer to the syslog output. What security level generated the message? Error Informational Warning Debugging 2. Refer to the syslog output. What is the …
1. Which NFP plane would typically use out-of-band (OOB) access? control plane management plane data plane 2. Which NFP plane uses CoPP? control plane management plane data plane 3. Which NFP plane is responsible for applying access control lists (ACLs)? control plane management plane data plane 4. The …
1. What is the weakest link in network security? reconnaissance access DoS social engineering 2. What type of attack is tailgating? reconnaissance access DoS social engineering 3. What type of attack is port scanning? reconnaissance access DoS social engineering 4. What is the weakest link in network security? …
1. What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network. trojan horse adware ransomware worm 2. What type of malware typically …
1. Hackers have gained access to account information and can now login into a system with the same rights as authorized users. What type of attack is this? compromised key password-based DoS social engineering 2. In what type of attack can threat actors change the data in packets …
1. Which network type consists of a number of LANs that are connected together across a limited geographic area? SOHO WAN CAN Data Center Cloud 2. Which network type includes a consumer grade router with basic security features to protect inside assets from outside attackers? SOHO CAN WAN …