1. Which IPS signature trigger category uses the simplest triggering mechanism and searches for a specific and pre-defined atomic or composite pattern? Pattern-Based Detection Honey Pot-Based Detection Policy-Based Detection Anomaly-Based Detection 2. What term describes a set of rules used by an IDS or IPS to detect typical …
1. What is an IPS signature? It is the timestamp that is applied to logged security events and alarms. It is the authorization that is required to implement a security policy. It is a set of rules used to detect typical intrusive activity. It is a security script …
1. Which statement accurately describes Cisco IOS zone-based policy firewall operation? The pass action works in only one direction. A router interface can belong to multiple zones. Router management interfaces must be manually assigned to the self zone. Service policies are applied in interface configuration mode. 2. How …
1. What is one benefit of using a next-generation firewall rather than a stateful firewall? reactive protection against Internet threats support of TCP-based packet filtering support of logging integrated use of an intrusion prevention system (IPS) 2. Which three layers of the OSI model include information that is …
1. In applying an ACL to a router interface, which traffic is designated as outbound? traffic that is coming from the source IP address into the router traffic that is going from the destination IP address into the router traffic that is leaving the router and going toward …
1. What is a feature of the TACACS+ protocol? It combines authentication and authorization as one process. It encrypts the entire body of the packet for more secure communications. It hides passwords during transmission using PAP and sends the rest of the packet in plaintext. It utilizes UDP …
1. What service or protocol does the Secure Copy Protocol rely on to ensure that secure copy transfers are from authorized users? AAA RADIUS IPsec SNMP 2. When password recovery on a router is being performed and the settings in NVRAM have been bypassed, which step should be …
1. What must be done before any role-based CLI views can be created? Assign multiple privilege levels. Configure usernames and passwords. Issue the aaa new-model command. Create the secret password for the root user. 2. Which three statements describe limitations in using privilege levels for assigning command authorization? …
1. At what point in the enterprise network are packets arriving from the internet examined prior to entering the network? campus core internet edge network edge WAN edge 2. What three configuration steps must be performed to implement SSH access to a router? (Choose three.) a password on …
1. What is the primary means for mitigating virus and Trojan horse attacks? blocking ICMP echo and echo-replies encryption antisniffer software antivirus software 2. What three items are components of the CIA triad? (Choose three.) availability integrity scalability intervention confidentiality access 3. Which security implementation will provide control …