nuts
Quiz
•
Education
•
University
•
Practice Problem
•
Easy
Ari Ari
Used 11+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?
Deploy a Cisco ASA.
Require remote access connections through IPsec VPN.
Deploy a Cisco SSL Appliance.
Use a Syslog server to capture network traffic.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?
Frames from PC1 will be forwarded to its destination, and a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log of the violation.
Frames from PC1 will be dropped, and a log message will be created
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security countermeasure is effective for preventing CAM table overflow attacks?
port security
IP source guard
Dynamic ARP Inspection
DHCP snooping
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two examples of DoS attacks? (Choose two.)
buffer overflow
ping of death
SQL injection
port scanning
phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?
a security association
hashing algorithms
a permit access list entry
transform sets
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)
a valid access list
the ISAKMP policy
encryption
the peer
the hash
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?
Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.
Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network
Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.
Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
epithelium
Quiz
•
University
15 questions
Primary or secondary sources RES120
Quiz
•
University
15 questions
Healthy Food
Quiz
•
KG - Professional Dev...
10 questions
Service Marketing
Quiz
•
University
10 questions
Quiz IAS 16
Quiz
•
University
10 questions
VCS quiz 1
Quiz
•
University
13 questions
CA 05
Quiz
•
3rd Grade - University
15 questions
QUIZ 3 : TOPIC 11 [INCOMPLETE RECORDS & SINGLE ENTRY]
Quiz
•
1st Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
