Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?
nuts

Quiz
•
Education
•
University
•
Easy
Ari Ari
Used 11+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Deploy a Cisco ASA.
Require remote access connections through IPsec VPN.
Deploy a Cisco SSL Appliance.
Use a Syslog server to capture network traffic.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?
Frames from PC1 will be forwarded to its destination, and a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log of the violation.
Frames from PC1 will be dropped, and a log message will be created
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security countermeasure is effective for preventing CAM table overflow attacks?
port security
IP source guard
Dynamic ARP Inspection
DHCP snooping
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two examples of DoS attacks? (Choose two.)
buffer overflow
ping of death
SQL injection
port scanning
phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?
a security association
hashing algorithms
a permit access list entry
transform sets
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)
a valid access list
the ISAKMP policy
encryption
the peer
the hash
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?
Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.
Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network
Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.
Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
GUESS THE LOGO

Quiz
•
7th Grade - University
15 questions
Part 1 CCNA

Quiz
•
University
10 questions
Network Design and Planning

Quiz
•
University
15 questions
Introduction to Subnetting

Quiz
•
10th Grade - University
10 questions
Internet of Things - Mod 1

Quiz
•
University
8 questions
ICT Quiz

Quiz
•
University
15 questions
Korea Quest: South Korea's History and Cultures

Quiz
•
University
15 questions
Road Safety Awareness

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade