Which statement is true about a Smurf attack?
Which statement is true about a Smurf attack? A. It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a target system. B. It intercepts the third step in a TCP three-way handshake to hijack a session. C. It uses Trojan horse applications to create a distributed collection […]
Which three items are Cisco best-practice recommendations for securing a network?
Which three items are Cisco best-practice recommendations for securing a network? (Choose three.) A. Deploy HIPS software on all end-user workstations. B. Routinely apply patches to operating systems and applications. C. Disable unneeded services and ports on hosts. D. Require strong passwords, and enable password expiration.
Which method is of gaining access to a system that bypasses normal security measures?
Which method is of gaining access to a system that bypasses normal security measures? A. Creating a back door B. Starting a Smurf attack C. Conducting social engineering D. Launching a DoS attack
if you input the command “enable secret level 5 password” in the global mode , what does it indica
As a candidate for CCNA examination, when you are familiar with the basic commands, if you input the command "enable secret level 5 password" in the global mode , what does it indicate? A. Set the enable secret command to privilege level 5. B. The enable secret password is hashed using SHA. C. The enable […]
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]
Which will be necessarily taken into consideration when implementing Syslogging in your network?
As a network engineer at Cisco.com, you are responsible for Cisco network. Which will be necessarily taken into consideration when implementing Syslogging in your network? A. Log all messages to the system buffer so that they can be displayed when accessing the router. B. Use SSH to access your Syslog information. C. Enable the highest […]
Which classes does the U.S. government place classified data into?
Which classes does the U.S. government place classified data into? (Choose three.) A. SBU B. Confidential C. Secret D. Top-secret Explanation/Reference: Table: Government and Military Data Classification:
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]
Which one of these statements is correct in regards to Next Gen University IPsec tunnel between its Santa Cruz
Which one of these statements is correct in regards to Next Gen University IPsec tunnel between
its Santa Cruz main campus and its SAC remote campus?
what is the protected subnet behind the SAC remote campus router?
The IPsec tunnel to the SAC remote campus terminates at which IP address, and what is the protected subnet behind the SAC remote campus router? (Choose two.)