1. Which characteristic helps identify a weak key and regenerate a new replacement key? key exchange key generation key revocation and destruction key verification 2. Which characteristic creates new keys for cryptography? key storage key exchange key generation key lifetime 3. Which characteristic is a mechanism that allows …
1. What is a cipher that replaces one letter for another, possibly retaining the letter frequency of the original message? brute-force cryptanalysis nonrepudiation substitution transposition Vigenère 2. What is a method of cryptanalysis in which an attacker tries every possible key knowing that eventually one of them will …
1. Refer to Chart 1. What is the encrypted text for the term ENCRYPTION? AJNVULPTKJ IRHVCTXMSN AJYNULPEKJ ISHVCTXMSR YHWLSJNCIH KTIXEVZOUT KTJYEVZOUT 2. Refer to Chart 2. What is the encrypted text for the word AUTHENCITY? UONBILCNCYMR HINNBCMIJNCH UONBYHNCWCNS JFYUMYNLSUAH ULNBOLCMECHA WIHZCXYHNCUF UHIHSGIOMFST 3. Refer to Chart 3. What …
1. Ensures privacy so that only the receiver can read the message. Confidentiality Integrity Authentication 2. Ensures that messages are not altered in transit. Confidentiality Integrity Authentication 3. Guarantees that a message comes from the source that it claims to come from. Confidentiality Integrity Authentication 4. In banking, …
1. Which statement describes STP? STP is a Layer 2 routing protocol. STP is a Layer 3 routing protocol for Ethernet LANs. STP is a Layer 2 loop prevention protocol for Ethernet LANs. STP is a Layer 3 loop prevention protocol for IP networks. 2. Without STP on …
1. What type of attack occurs when a threat actor sends packets with false MAC or IP addresses? VLAN attacks address spoofing DHCP attacks ARP attacks 2. What prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks? IP Source Guard (IPSG) DHCP Snooping …
1. What prevents endpoints from connecting with websites that have a bad reputation based on the latest reputation intelligence? blocklisting spam filtering data loss prevention antimalware software 2. What protects endpoints from malicious software? blocklisting spam filtering data loss prevention antimalware software 3. What prevents sensitive information from …
1. Which type of file contains a compressed, installable version of the Snort IPS virtual machine? BIN EXE OVA VPG 2. Which Snort IPS interface statement is true? One loopback interface is required Two ethernet interfaces are required Two virtual port group interfaces are required Two VLAN interfaces
1. What are the three actions supported by Snort IDS? (Choose three.) Alert Drop Log Pass Reject Sdrop 2. Which two options are components of Snort IPS that is running on an ISR 4000? (Choose two.) Snort action Snort alarm Snort engine Snort rule set
1. Which action logs the IP address from a malicious source only and sends an alert? request block host drop or prevent the activity log attacker packets deny connection inline reset a TCP connection 2. Which action terminates a malicious packet only? request drop host request block trap …