1. In what way are zombies used in security attacks? They probe a group of machines for open ports to learn which services are running. They target specific individuals to gain corporate or personal information. They are infected machines that carry out a DDoS attack. They are maliciously …
1. Which security measure is typically found both inside and outside a data center facility? a gate biometrics access exit sensors security traps continuous video surveillance 2. Which statement accurately characterizes the evolution of threats to network security? Threats have become less sophisticated while the technical knowledge needed …
1. Refer to the exhibit. Which technology generated the event log? Wireshark web proxy syslog Netflow 2. A network engineer is using SNMP manager software to monitor and manage network performance. In addition to polling network devices at regular time intervals, the engineer is configuring the devices to …
1. What is the Control Plane Policing (CoPP) feature designed to accomplish? manage services provided by the control plane prevent unnecessary traffic from overwhelming the route processor disable control plane services to reduce overall traffic direct all excess traffic away from the route processor 2. A network administrator …
1. ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.) specifying source addresses for authentication specifying internal hosts for NAT identifying traffic for QoS reorganizing traffic into VLANs filtering VTP packets 2. Which set of access control entries would allow all …
1. What are the three elements of secure data transport? (Choose three.) confidentiality integrity availability authorization scalability accountability 2. What is a characteristic of the IP authentication header? the assurance that the original data packet has not been modified during transport the provision for data confidentiality, integrity, and …
1. Which NHRP message type is sent by a DMVPN spoke to inform the DMVPN hub of NBMA information? registration resolution redirect purge 2. What is a feature of DMVPN Phase 1? support for VPN tunnels only between spoke and hub sites support for spoke-to-spoke communication on a …
1. Which routing protocol is used in MPLS Layer 3 VPNs to form peerings between PE routers? MP-BGP OSPFv3 ISIS EIGRP 2. What is used by provider routers to forward packets through the MPLS domain? labels destination IP address DLCI destination MẠC address 3. Refer to the exhibit. …
1. A network engineer is implementing redistribution of two routing protocols across a network topology. Under which situation would there be minimal concern of network visibility being hidden from the destination routing source? when there is only one point of redistribution between two sources while performing multipoint redistribution …