During a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

During a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the…

Continue ReadingDuring a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential?

What are three techniques for mitigating VLAN hopping attacks? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What are three techniques for mitigating VLAN hopping attacks? (Choose three.) Disable DTP. Enable trunking manually. Set the native VLAN to an unused VLAN. Enable BPDU guard. Enable Source Guard.…

Continue ReadingWhat are three techniques for mitigating VLAN hopping attacks? (Choose three.)

Which two security features can cause a switch port to become error-disabled? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which two security features can cause a switch port to become error-disabled? (Choose two.) root guard PortFast with BPDU guard enabled protected ports storm control with the trap option port…

Continue ReadingWhich two security features can cause a switch port to become error-disabled? (Choose two.)

A company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been…

Continue ReadingA company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated?

What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication? RADIUS TACACS+ SSH MD5 Answers Explanation & Hints: Encapsulation of EAP data…

Continue ReadingWhat protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?

A company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops? AMP…

Continue ReadingA company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops?

What is the IPS detection engine that is included in the SEC license for 4000 Series ISRs?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is the IPS detection engine that is included in the SEC license for 4000 Series ISRs? Security Onion Snort ASDM AMP Answers Explanation & Hints: Snort is the IPS…

Continue ReadingWhat is the IPS detection engine that is included in the SEC license for 4000 Series ISRs?

When a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

When a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.) log hold drop inspect copy forward Answers Explanation…

Continue ReadingWhen a Cisco IOS Zone-Based Policy Firewall is being configured, which two actions can be applied to a traffic class? (Choose two.)

When a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

When a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created? Design the physical infrastructure. Establish policies between zones.…

Continue ReadingWhen a Cisco IOS Zone-Based Policy Firewall is being configured via CLI, which step must be taken after zones have been created?

What are two benefits offered by a zone-based policy firewall on a Cisco router? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What are two benefits offered by a zone-based policy firewall on a Cisco router? (Choose two.) Policies are defined exclusively with ACLs. Policies are applied to unidirectional traffic between zones.…

Continue ReadingWhat are two benefits offered by a zone-based policy firewall on a Cisco router? (Choose two.)

A company is deploying a new network design in which the border router has three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01 connects to the internal private network. Which type of traffic would receive the least amount of inspection (have the most freedom of travel)?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A company is deploying a new network design in which the border router has three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01 connects…

Continue ReadingA company is deploying a new network design in which the border router has three interfaces. Interface Serial0/0/0 connects to the ISP, GigabitEthernet0/0 connects to the DMZ, and GigabitEthernet/01 connects to the internal private network. Which type of traffic would receive the least amount of inspection (have the most freedom of travel)?

Which type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 and Layer 4 information?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 and Layer 4 information? stateless firewall stateful firewall proxy firewall…

Continue ReadingWhich type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 and Layer 4 information?

What is an advantage in using a packet filtering firewall versus a high-end firewall appliance?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is an advantage in using a packet filtering firewall versus a high-end firewall appliance? Packet filters perform almost all the tasks of a high-end firewall at a fraction of…

Continue ReadingWhat is an advantage in using a packet filtering firewall versus a high-end firewall appliance?

Refer to the exhibit. An extended access list has been created to prevent human resource users from gaining access to the accounting server. All other network traffic is to be permitted. When following the ACL configuration guidelines, on which router, interface, and direction should the access list be applied?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. An extended access list has been created to prevent human resource users from gaining access to the accounting server. All other network traffic is to be…

Continue ReadingRefer to the exhibit. An extended access list has been created to prevent human resource users from gaining access to the accounting server. All other network traffic is to be permitted. When following the ACL configuration guidelines, on which router, interface, and direction should the access list be applied?

A network administrator is explaining to a junior colleague the use of the lt and gt keywords when filtering packets using an extended ACL. Where would the lt or gt keywords be used?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator is explaining to a junior colleague the use of the lt and gt keywords when filtering packets using an extended ACL. Where would the lt or gt…

Continue ReadingA network administrator is explaining to a junior colleague the use of the lt and gt keywords when filtering packets using an extended ACL. Where would the lt or gt keywords be used?

What is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence? that user access is limited to vty terminal lines that passwords and…

Continue ReadingWhat is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence?