Which of the following could be best described as an advanced persistent attack? (Select the best answer.)
Which of the following could be best described as an advanced persistent attack? (Select the best answer.) A. a DDoS attack B. Operation Aurora C. the Heartbleed vulnerability D. POODLE Explanation: Of the available choices, Operation Aurora could be best described as an advanced persistent threat. An advanced persistent threat is an intrusion in which […]
Which of the following is most likely to indicate that the configured main mode ISAKMP policy does not match t
Which of the following is most likely to indicate that the configured main mode ISAKMP policy does not match the policy proposed by the remote peer? (Select the best answer.) A. AG_NO_STATE B. MM_NO_STATE C. AG_AUTH D. MM_KEY_AUTH E. QM_IDLE Explanation: Of the available choices, the MM_NO_STATE state is most likely to indicate that the […]
Which of the following is true? (Select the best answer.)
You issue the show ntp associations detail command on Router2 and receive the following output: Router2#show ntp associations detail 10.0.12.1 configured, authenticated, our_master, sane, valid, stratum 3 ref ID 127.127.1.1, time BF6C06E0.55040FD5 (09:02:04.717 UTC Thu Jul 25 2013) Which of the following is true? (Select the best answer.) A. Router2 has successfully authenticated the NTP […]
EAPFASTv2 implemented a requirement to support which of the following cryptographic protocols? (Select the bes
EAPFASTv2 implemented a requirement to support which of the following cryptographic protocols? (Select the best answer.) A. TLS 1.0 B. TLS 1.1 C. TLS 1.2 D. TLS 1.3 Explanation: Extensible Authentication ProtocolFlexible Authentication via Secure Tunneling Version 2 (EAPFASTv2) implemented a requirement to support Transport Layer Security (TLS) 1.2. EAPFAST is an authentication protocol that […]
The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You i
The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You issue the following commands on Router1: interface serial 0/0 ip ospf authenticationkey b0s0n router ospf 1 routerid 1.1.1.1 network 10.10.10.0 0.0.0.255 area 1 network 192.168.51.48 0.0.0.3 area 1 area 0 authentication You issue the following commands on Router2: interface […]
Which of the following is a type of phishing attack that specifically targets highranking corporate executives
Which of the following is a type of phishing attack that specifically targets highranking corporate executives? (Select the best answer.) A. vishing B. pharming C. whaling D. dumpster diving Explanation: Whaling is a type of spear phishing attack used to retrieve sensitive information from highranking executives of a corporation. Phishing is a social engineering technique […]
Which of the following is the ASA most likely to match? (Select the best answer.)
A Cisco ASA queries an LDAP server for a VPN user OU attribute of bsnsw and receives multiple results. Which of the following is the ASA most likely to match? (Select the best answer.) A. the last result in the list of results containing the attribute B. the first result in the list of results […]
Which of the following are Cisco IOS privilege levels that are not typically assigned by default? (Select 3 ch
Which of the following are Cisco IOS privilege levels that are not typically assigned by default? (Select 3 choices.) A. 1 B. 5 C. 7 D. 10 E. 15 Explanation: Of the available choices, privilege levels 5, 7, and 10 are custom privilege levels and are not typically assigned by default. Privilege levels can be […]
Which of the following traffic can be statefully inspected by Cisco IOS ZFW? (Select the best answer.)
Which of the following traffic can be statefully inspected by Cisco IOS ZFW? (Select the best answer.) A. IPv6 unicast traffic B. IPv6 multicast traffic C. IPv4 unicast traffic D. IPv4 multicast traffic Explanation: In a Cisco IOS zonebased policy firewall (ZFW) configuration, IP version 4 (IPv4) unicast traffic can be statefully inspected. As of […]
Which of the following devices are least likely to deny a connection inline when an attack is detected? (Selec
Which of the following devices are least likely to deny a connection inline when an attack is detected? (Select 2 choices.) A. an IPS B. a router C. an IDS D. a Layer 3 switch E. a Layer 2 switch Explanation: A Layer 2 switch and an Intrusion Detection System (IDS) are least likely to […]