What is a characteristic of a DMZ zone?
What is a characteristic of a DMZ zone? Traffic originating from the inside network going to the DMZ network is not permitted. Traffic originating from the DMZ network going to…
What is a characteristic of a DMZ zone? Traffic originating from the inside network going to the DMZ network is not permitted. Traffic originating from the DMZ network going to…
In an AAA-enabled network, a user issues the configure terminal command from the privileged executive mode of operation. What AAA function is at work if this command is rejected? authentication…
Which network monitoring technology uses VLANs to monitor traffic on remote switches? IPS IDS TAP RSPAN Answers Explanation & Hints: Remote SPAN (RSPAN) enables a network administrator to use the…
What function is provided by Snort as part of the Security Onion? to generate network intrusion alerts by the use of rules and signatures to normalize logs from various NSM…
The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks? authentication nonrepudiation integrity Diffie-Hellman confidentiality Answers Explanation & Hints: he IPsec…
Which action do IPsec peers take during the IKE Phase 2 exchange? negotiation of IPsec policy negotiation of IKE policy sets verification of peer identity exchange of DH keys Answers…
Which statement describes a characteristic of the IKE protocol? It uses UDP port 500 to exchange IKE information between the security gateways. IKE Phase 1 can be implemented in three…
A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration? integrity…
A network technician has been asked to design a virtual private network between two branch routers. Which type of cryptographic key should be used in this scenario? symmetric key digital…
Refer to the exhibit. According to the command output, which three statements are true about the DHCP options entered on the ASA? (Choose three.) The dhcpd address [ start-of-pool ]-[…
Refer to the exhibit. What will be displayed in the output of the show running-config object command after the exhibited configuration commands are entered on an ASA 5506-X? host 192.168.1.4…
A client connects to a Web server. Which component of this HTTP connection is not examined by a stateful firewall? the source IP address of the client traffic the destination…
Which statement describes a difference between the Cisco ASA IOS CLI feature and the router IOS CLI feature? To indicate the CLI EXEC mode, ASA uses the % symbol whereas…
Which type of firewall makes use of a server to connect to destination devices on behalf of clients? packet filtering firewall proxy firewall stateless firewall stateful firewall Answers Explanation &…
How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network? Traffic that is originating from the public network is inspected…
What two features are added in SNMPv3 to address the weaknesses of previous versions of SNMP? (Choose two.) authentication authorization with community string priority bulk MIB objects retrieval ACL management…
Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.) This message indicates that the interface changed state…
What is a limitation to using OOB management on a large enterprise network? All devices appear to be attached to a single management network. OOB management requires the creation of…
What network testing tool is used for password auditing and recovery? Nessus Metasploit L0phtcrack SuperScan
What type of network security test can detect and report changes made to network systems? integrity checking penetration testing vulnerability scanning network scanning Answers Explanation & Hints: Integrity checking is…