nuts

Quiz
•
Education
•
University
•
Easy
Ari Ari
Used 11+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?
Deploy a Cisco ASA.
Require remote access connections through IPsec VPN.
Deploy a Cisco SSL Appliance.
Use a Syslog server to capture network traffic.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?
Frames from PC1 will be forwarded to its destination, and a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log of the violation.
Frames from PC1 will be dropped, and a log message will be created
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security countermeasure is effective for preventing CAM table overflow attacks?
port security
IP source guard
Dynamic ARP Inspection
DHCP snooping
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two examples of DoS attacks? (Choose two.)
buffer overflow
ping of death
SQL injection
port scanning
phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?
a security association
hashing algorithms
a permit access list entry
transform sets
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)
a valid access list
the ISAKMP policy
encryption
the peer
the hash
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?
Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.
Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network
Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.
Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
ICT Quiz

Quiz
•
University
10 questions
Honeypots

Quiz
•
University
10 questions
Firewall

Quiz
•
University
10 questions
Network Design and Planning

Quiz
•
University
10 questions
iRakshak

Quiz
•
University
15 questions
CN Network Layer Part 1

Quiz
•
University
15 questions
Introduction to Subnetting

Quiz
•
10th Grade - University
10 questions
Internet of Things - Mod 1

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade