PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following traffic can be statefully inspected by Cisco IOS ZFW? (Select the best answer.)

Which of the following traffic can be statefully inspected by Cisco IOS ZFW? (Select the best answer.) A. IPv6 unicast traffic B. IPv6 multicast traffic C. IPv4 unicast traffic D. IPv4 multicast traffic Explanation: In a Cisco IOS zonebased policy firewall (ZFW) configuration, IP version 4 (IPv4) unicast traffic can be statefully inspected. As of […]

Which of the following threats has a dedicated FirePOWER preprocessor engine? (Select the best answer.)

Which of the following threats has a dedicated FirePOWER preprocessor engine? (Select the best answer.) A. Back Orifice B. distributed port scan C. port sweep D. SYN flood Explanation: Of the choices provided, only Back Orifice is a threat that has a dedicated FirePOWER preprocessor engine. A FirePOWER Intrusion Prevention System (IPS) has several predefined […]

Which of the following commands are you most likely to issue next to complete the configuration? (Select the b

You have been asked to enable the Cisco IOS Resilient Configuration feature on a Cisco router. You issue the following commands on the router: Router#configure terminal Router(config)#secure boot-image Which of the following commands are you most likely to issue next to complete the configuration? (Select the best answer.) A. reload B. confreg 0x2102 C. secure […]

Which of the following ISAKMP states indicates that the IKE peers have negotiated security parameters and exch

Which of the following ISAKMP states indicates that the IKE peers have negotiated security parameters and exchanged keys using aggressive mode during phase 1 of the IKE process? (Select the best answer.) A. AG_INIT_EXCH B. MM_KEY_EXCH C. MM_SA_SETUP D. QM_IDLE Explanation: The AG_INIT_EXCH Internet Security Association and Key Management Protocol (ISAKMP) state indicates that the […]

Which of the following is most likely to protect the availability component of the CIA triad? (Select the best

Which of the following is most likely to protect the availability component of the CIA triad? (Select the best answer.) A. data encryption B. an IPS C. a virus scanner D. a VPN Explanation: Of the available choices, an Intrusion Prevention System (IPS) is most likely to protect the availability component of the confidentiality, integrity, […]

RADIUS and TACACS+ have which of the following in common? (Select the best answer.)

RADIUS and TACACS+ have which of the following in common? (Select the best answer.) A. They communicate by using the same transport protocol. B. They are AAA protocols. C. They are Ciscoproprietary protocols. D. They encrypt the entire packet. Explanation: Terminal Access Controller Access Control System Plus (TACACS+) and Remote Authentication DialIn User Service (RADIUS) […]


Page 16 of 396« First...10...1415161718...304050...Last »