dasdas

dasdas

University

10 Qs

quiz-placeholder

Similar activities

LESSON 4: MY ROOM

LESSON 4: MY ROOM

University

12 Qs

External Lab AMC-105

External Lab AMC-105

University

12 Qs

Pre-test Module 1 (F) - 2025

Pre-test Module 1 (F) - 2025

University

10 Qs

FRONT OFFICE OPERATIONS II

FRONT OFFICE OPERATIONS II

University

12 Qs

REPUBLIC DAY

REPUBLIC DAY

2nd Grade - Professional Development

15 Qs

Beginning of the term quiz

Beginning of the term quiz

University

10 Qs

Total Physical Response

Total Physical Response

University

10 Qs

Mollusks

Mollusks

10th Grade - University

10 Qs

dasdas

dasdas

Assessment

Quiz

Education

University

Practice Problem

Easy

Created by

Ari Ari

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. A network administrator is configuring a VPN between routers R1 and R2. Which commands would correctly configure a pre-shared key for the two routers?

R1(config-if)# ppp pap sent-username R1 password 5tayout!

R2(config-if)# ppp pap sent-username R2 password 5tayout!

R1(config)# crypto isakmp key 5tayout! hostname R1

R2(config)# crypto isakmp key 5tayout! hostname R2

R1(config)# crypto isakmp key 5tayout! address 64.100.0.2

R2(config)# crypto isakmp key 5tayout! address 64.100.0.1

R1(config)# username R2 password 5tayout!

R2(config)# username R1 password 5tayout!

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. Which statement is true about the effect of this Cisco IOS zone-based policy firewall configuration?

The firewall will automatically allow HTTP, HTTPS, and FTP traffic from s0/0/0 to g0/0 and will track the connections. Tracking the connection allows only return traffic to be permitted through the firewall in the opposite direction.

The firewall will automatically allow HTTP, HTTPS, and FTP traffic from s0/0/0 to g0/0, but will not track the state of connections. A corresponding policy must be applied to allow return traffic to be permitted through the firewall in the opposite direction.

The firewall will automatically allow HTTP, HTTPS, and FTP traffic from g0/0 to s0/0/0 and will track the connections. Tracking the connection allows only return traffic to be permitted through the firewall in the opposite direction.

return traffic to be permitted through the firewall in the opposite direction.

The firewall will automatically allow HTTP, HTTPS, and FTP traffic from g0/0 to s0/0/0, but will not track the state of connections. A corresponding policy must be applied to allow return traffic to be permitted through the firewall in the opposite direction.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which privilege level has the most access to the Cisco IOS?

level 16

level 7

level 15

level 0

level 1

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. A network administrator has configured NAT on an ASA device. What type of NAT is used?

outside NAT

bidirectional NAT

static NAT

inside NAT

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network analyst is configuring a site-to-site IPsec VPN. The analyst has configured both the ISAKMP and IPsec policies. What is the next step?

Verify that the security feature is enabled in the IOS.

Issue the show crypto ipsec sa command to verify the tunnel.

Apply the crypto map to the appropriate outbound interfaces.

Configure the hash as SHA and the authentication as pre-shared.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks?

ACEs to prevent SNMP traffic

ACEs to prevent HTTP traffic

ACEs to prevent ICMP traffic

ACEs to prevent broadcast address traffic

ACEs to prevent traffic from private address spaces

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two types of attacks are examples of reconnaissance attacks? (Choose two.)

SYN flood

man-in-the-middle

brute force

ping sweep

port scan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?