Which of the following aptly describes the Unix file /etc/shadow?
Which of the following aptly describes the Unix file /etc/shadow?
which format are IPS signatures stored?
Simply put, an IPS signature is any distinctive characteristic that identifies something. Using this definition, all IPS products use signatures of some kind, regardless of what the product descriptions claim. In which format are IPS signatures stored?
If the read community is known and there is SNMP connectivity to a device (without an access-list limiting thi
If the read community is known and there is SNMP connectivity to a device (without an access-list limiting this):
What command sequence should be used to turn on RADIUS in a router?
What command sequence should be used to turn on RADIUS in a router?
Why it is important to delete IPSec Security Associations (SAs) frequently and then re-key and reestablish the
Why it is important to delete IPSec Security Associations (SAs) frequently and then re-key and reestablish the SA’s?
The main reason the NFS protocol is not recommended for use across a firewall or a security domain is that..
The main reason the NFS protocol is not recommended for use across a firewall or a security domain is that.
what statement is FALSE?
When a Cisco Secure Intrustion Detection System Sensor communicates with a Cisco Secure Instrustion Detection System Director, what statement is FALSE?
What is the minimum number of commands you can type to tell your router about your RADIUS server?
Your RADIUS server is at IP address 172.22.53.201 and the authentication key is “Cisco”. AAA has not yet been configured on your router. What is the minimum number of commands you can type to tell your router about your RADIUS server? (Select all that apply)
which three actions will be taken by the security appliance to classify packets into a context?
In your company’s network, a Cisco adaptive security appliance is running in multiple context mode. Multiple contexts are associated with the ingress interface. As a network technician of your company, can you tell me which three actions will be taken by the security appliance to classify packets into a context? (Choose three.)
Which of the following commands tell the Cisco IOS to use and understand VSA’s?
In RFC 2138 (RADIUS), vendor specific attributes (VSA) are specified. Specifically, this is called VSA 26 (attribute 26). These allow vendors to support their own extended options. Cisco’s vendor ID is 9. Which of the following commands tell the Cisco IOS to use and understand VSA’s? (Select all that apply)