58. What are two protocols that are used by AAA to authenticate users...
31. A network administrator configures the alert generation of an IPS...
80. Place the system development cycle (SDLC) phases in the order they...
81. Fill in the blank.When role-based CLI is used, only the...
Refer to the exhibit. The administrator can ping the S0/0/1 interface...
11. What is a type of SSL VPN that provides access to a network...
22. How would a network security professional mitigate a DoS attack?
2. With the Cisco AnyConnect VPN wizard, which two protocols can be...
27. What will be disabled as a result of the no service...
48. Which security feature would be commonly implemented as part of a...
49. Which two commands are needed on every IPv6 ACL to allow IPv6...
18. What is the best way to prevent a VLAN hopping attack?
55. Two devices that are connected to the same switch need to be...
39. Which security policy component would contain procedures for...
24. Which algorithm is used to automatically generate a shared secret...
13. What is the main difference between the implementation of IDS and...
17. What is a difference between ASA IPv4 ACLs and IOS IPv4 ACLs?
19. Why have corporations been shifting remote access security...
9. What is an advantage of using SSL VPNs compared to IPsec VPNs on an...
6. When configuring router security, which statement describes the...
32. Which STP port type is permitted to forward traffic, but is not...
Refer to the exhibit. An administrator is examining the message in a...
14. What information must an IPS track in order to detect attacks...
47. Why does a worm pose a greater threat than a virus poses?
64. Fill in the blank.In a syslog implementation, a router that...
15. What method is used to authenticate SNMPv2 messages between the...
59. Which security organization updates the training material that...
75. In a corporate network where SAN is deployed, what happens if the...
Refer to the exhibit. Which pair of crypto isakmp key commands would...
25. What type of security key is generated by the local user software...
74. Refer to the exhibit. An administrator creates three zones (A, B,...
35. What is the basic method used by 3DES to encrypt plaintext?
16. Which statement describes the characteristics of packet-filtering...
79. A user complains about not being able to gain access to the...
Refer to the exhibit. Which interface configuration completes the...
61. Refer to the exhibit. An administrator has configured an ASA 5505...
40. What question is answered by the risk analysis component of...
78. What is an example of toll fraud?
29. What is one benefit of implementing a secure email service by...
70. What is one way to prevent attackers from eavesdropping on...
46. In deploying an IPS in a corporate network, system operators first...
50. A network technician has been asked to design a virtual private...
38. What are three goals of a port scan attack? (Choose three.)
57. Which security feature helps protect a VoIP system from SPIT...
73. What command must be issued to enable login enhancements on a...
37. Which two security features can cause a switch port to become...
71. A large company deploys several network-based IPS sensors for its...
77. Logging into a computer as the administrator just to surf the web...
3. What are two disadvantages of using network IPS? (Choose two.)
Refer to the exhibit. An administrator is implementing VPN support on...
Refer to the exhibit. What is the purpose of the object group-based...
62. Refer to the exhibit. What will be displayed in the output of the...
8. A network technician is configuring SNMPv3 and has set a security...
68. What is a CLI initiated script that locks down the control plane...
Refer to the exhibit. A network administrator is troubleshooting a GRE...
1. Which statement is true about the One-Step lockdown feature of the...
54. Which statement accurately describes Cisco IOS zone-based policy...
45. Which spanning-tree enhancement prevents the spanning-tree...
26. What is one advantage of using a Cisco ASA for remote networking...
28. In what two phases of the system development life cycle does risk...
Refer to the exhibit. What is the purpose of the highlighted inspect...
56. Why is a reflexive ACL harder to spoof compared to an extended ACL...
Refer to the exhibit. A network administrator is configuring the...
Refer to the exhibit. What is the purpose of the ACLs?
Refer to the exhibit. A network administrator configures AAA...
51. A company is designing its strategy of deploying Cisco Secure ACS...
67. What is an advantage of using CCP rather than the CLI to configure...
60. Which three wizards are included in Cisco ASDM 6.4? (Choose...
53. Which two options are offered through the Cisco TrustSec Solution...
72. What is the role of the Cisco NAC Manager in implementing a secure...
23. Which three statements describe limitations in using privilege...
12. What are two reasons for a company to migrate from a classic...
41. What are two characteristics of an acceptable use policy? (Choose...
5. What are two benefits of an SSL VPN? (Choose two.)
76. What three phases would be addressed as part of doing business...
66. Refer to the exhibit. The network administrator is configuring the...
Refer to the exhibit. Based on the output from the show secure bootset...
65. Which three types of remote access VPNs are supported on ASA...
69. Which three statements should be considered when applying ACLs to...
43. What are two features of Cisco Easy VPN Server? (Choose two.)
63. Refer to the exhibit. According to the command output, which three...