
nuts
Authored by Ari Ari
Education
University
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?
Deploy a Cisco ASA.
Require remote access connections through IPsec VPN.
Deploy a Cisco SSL Appliance.
Use a Syslog server to capture network traffic.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?
Frames from PC1 will be forwarded to its destination, and a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log of the violation.
Frames from PC1 will be dropped, and a log message will be created
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security countermeasure is effective for preventing CAM table overflow attacks?
port security
IP source guard
Dynamic ARP Inspection
DHCP snooping
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two examples of DoS attacks? (Choose two.)
buffer overflow
ping of death
SQL injection
port scanning
phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?
a security association
hashing algorithms
a permit access list entry
transform sets
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)
a valid access list
the ISAKMP policy
encryption
the peer
the hash
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?
Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.
Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network
Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.
Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?