1. Which ACL is capable of filtering based on TCP port number? extended ACL standard ACL 2. Which statement about ACLs is true? Extended ACLs are numbered 1300 – 2699. Named ACLs can be standard or extended. Numbered ACLs is the preferred method to use when configuring ACLs. …
1. How many total ACLs (both IPv4 and IPv6) can be configured on an interface? 0 1 2 4 8 2. Which of the following is an ACL best practice? Always test ACLs on a production network. Create your ACLs on a production router. Document the ACLs using …
1. Which wildcard mask would permit only host 10.10.10.1? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 2. Which wildcard mask would permit only hosts from the 10.10.0.0/16 network? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 3. Which wildcard mask would permit all hosts? 0.0.0.0 0.0.0.31 0.0.0.255 0.0.255.255 255.255.255.255 4. Which wildcard mask …
1. What are the permit or deny statements in an ACL called? access control entries arbitrary statements content control entries control statements 2. Which packet filtering statement is true? Extended ACLs filter at Layer 3 only. Extended ACLs filter at Layer 4 only. Standard ACLs filter at Layer …
1. Which encryption method repeats an algorithm process three times and is considered very trustworthy when implemented using very short key lifetimes? Rivest Cipher Triple DES Block Cipher Data Encryption Standard Stream Cipher 2. Which encryption method encrypts plaintext one byte or one bit at a time? Rivest …
1. Which network security device ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts? VPN ASA Firewall IPS ESA/WSA AAA Server 2. Which network security device contains a secure database of who is authorized to access and manage …
1. Which attack exploits the three-way handshake? TCP reset attack UDP flood attack TCP SYN Flood attack DoS attack TCP session hijacking 2. Two hosts have established a TCP connection and are exchanging data. A threat actor sends a TCP segment with the RST bit set to both …
1. Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication? Address Spoofing Attack Amplification and Reflection Attacks ICMP Attack MiTM Attack Session Hijacking 2. Which attack is being used when threat actors gain access …
1. What type of attack is tailgating? Reconnaissance Access DoS Social Engineering 2. What type of attack is a password attack? Reconnaissance Access DoS Social Engineering 3. What type of attack is port scanning? Reconnaissance Access DoS Social Engineering 4. What type of attack is man-in-the-middle? Reconnaissance Access …
1. Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network. Adware Rootkit Spyware Virus Worm 2. Which malware is non-self-replicating type of malware? …