What does the following command used for?
What does the following command used for?
fw1 (config)#filter activex 80 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0
Which items are the most common methods used for managing risk?
Which items are the most common methods used for managing risk?
Which option is correct about the relationship between the malware type and its description?
Which option is correct about the relationship between the malware type and its description?
1. virus
2. worms
3. botnets
4. spyware
5. Trojan horses
6. rootkits
a. collection of compromised computers under a common command-and-control infrastructure
b. typically used to monitor user actions
c. autonomously spreads to other systems without user interaction
d. malware that hides through evasion of the operating system security mechanisms
e. requires some user action to infect the system
f. malware that hides inside anoter legitimate looking application
Which options can a clientless SSL VPN user access from a web browser without port forwarding, smart tunnels,
Which options can a clientless SSL VPN user access from a web browser without port forwarding,
smart tunnels, or browser plug-ins?
Which item is correct about the relationship between the security risk management related term and its proper
Which item is correct about the relationship between the security risk management related term
and its proper definition?
1.asset
2.threat
3.vulnerability
4.risk
a. anything that has value to an organization
b. A weakness in a system or its design that could be exploited
c. The likelihood of a particular attack occurring and resulting in an undesirable consequence
d. Any circumstance or event with the potential to cause harm to an information system
Which function can be implemented by the Cisco Security Agent data access control feature?
Which function can be implemented by the Cisco Security Agent data access control feature?
Which user account role on a Cisco IPS sensor must you specifically create in order to allow special root acce
Which user account role on a Cisco IPS sensor must you specifically create in order to allow
special root access for troubleshooting purposes only?
Which series of steps correctly describes how a challenge-and-response authentication protocol functions?
Which series of steps correctly describes how a challenge-and-response authentication protocol
functions?
Which three encryption algorithms will Cisco ASA security appliances use?
Which three encryption algorithms will Cisco ASA security appliances use? (Choose three.)
Which attack method is typically used by Pharming attacks that are used to fool users into submitting sensitiv
Which attack method is typically used by Pharming attacks that are used to fool users into
submitting sensitive information to malicious servers?