Which statement is true about a Smurf attack?
Which statement is true about a Smurf attack? A. It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a target system. B. It intercepts the third step in a TCP three-way handshake to hijack a session. C. It uses Trojan horse applications to create a distributed collection […]
Which method is of gaining access to a system that bypasses normal security measures?
Which method is of gaining access to a system that bypasses normal security measures? A. Creating a back door B. Starting a Smurf attack C. Conducting social engineering D. Launching a DoS attack
if you input the command “enable secret level 5 password” in the global mode , what does it indica
As a candidate for CCNA examination, when you are familiar with the basic commands, if you input the command "enable secret level 5 password" in the global mode , what does it indicate? A. Set the enable secret command to privilege level 5. B. The enable secret password is hashed using SHA. C. The enable […]
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]
Which will be necessarily taken into consideration when implementing Syslogging in your network?
As a network engineer at Cisco.com, you are responsible for Cisco network. Which will be necessarily taken into consideration when implementing Syslogging in your network? A. Log all messages to the system buffer so that they can be displayed when accessing the router. B. Use SSH to access your Syslog information. C. Enable the highest […]
Which classes does the U.S. government place classified data into?
Which classes does the U.S. government place classified data into? (Choose three.) A. SBU B. Confidential C. Secret D. Top-secret Explanation/Reference: Table: Government and Military Data Classification:
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]
