When configuring Cisco IOS login enhancements for virtual connections, what is the “quiet period”?
When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"? A. A period of time when no one is attempting to log in B. The period of time in which virtual logins are blocked as security services fully initialize C. The period of time in which virtual login attempts are blocked, […]
which one offers a variety of security solutions, including firewall, IPS, VPN, antispyware, antivirus, and an
Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN, antispyware, antivirus, and antiphishing features? A. Cisco 4200 series IPS appliance B. Cisco ASA 5500 series security appliance C. Cisco IOS router D. Cisco PIX 500 series security appliance Explanation/Reference: The Cisco advances in firewall technologies include the acquisition […]
What is the reason that Cisco still support the use of both enable secret and enable passwords in a routerR
The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enable password is not hashed (or encrypted, if the password-encryption service is not enabled). What is the reason that Cisco still support the use of both enable secret and enable passwords in a router’s configuration? A. The enable password […]
How does CLI view differ from a privilege level?
How does CLI view differ from a privilege level? A. A CLI view supports only commands configured for that specific view, whereas a privilege level supports commands available to that level and all the lower levels. B. A CLI view supports only monitoring commands, whereas a privilege level allows a user to make changes to […]
Which is the main difference between host-based and network-based intrusion prevention?
Which is the main difference between host-based and network-based intrusion prevention? A. Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows. B. Host-based IPS can work in promiscuous mode or inline mode. C. Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on […]
Which one is the most important based on the following common elements of a network design?
Which one is the most important based on the following common elements of a network design? A. Business needs B. Best practices C. Risk analysis D. Security policy Explanation/Reference: A common temptation when designing a security solution for a network is to make the network so secure that it cannot easily be used for its […]
On the basis of the Syslog message shown, which two descriptions are correct?
Given the exhibit below. You are a network manager of your company. You are reading your Syslog server reports. On the basis of the Syslog message shown, which two descriptions are correct? (Choose two.) A. This message is a level 5 notification message. B. This message is unimportant and can be ignored. C. This is […]
which one is to ensure that no one employee becomes a pervasive security threat, that data can be recovered fr
For the following attempts, which one is to ensure that no one employee becomes a pervasive security threat, that data can be recovered from backups, and that information system changes do not compromise a system’s security? A. Disaster recovery B. Strategic security planning C. Implementation security D. Operations security
which one accurately matches the CLI command(s) to the equivalent SDM wizard that performs similar configurati
For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM wizard that performs similar configuration functions? A. setup exec command and the SDM Security Audit wizard B. auto secure exec command and the SDM One-Step Lockdown wizard C. aaa configuration commands and the SDM Basic Firewall wizard D. Cisco Common […]
Which three options are network evaluation techniques?
Which three options are network evaluation techniques? (Choose three.) A. Scanning a network for active IP addresses and open ports on those IP addresses B. Using password-cracking utilities C. Performing end-user training on the use of antispyware software D. Performing virus scans