PrepAway - Latest Free Exam Questions & Answers

What is an advantage of implementing a Trusted Platform Module for disk encryption?

What is an advantage of implementing a Trusted Platform Module for disk encryption?

PrepAway - Latest Free Exam Questions & Answers

A.
It provides hardware authentication.

B.
It allows the hard disk to be transferred to another device without requiring re- encryption.dis

C.
It supports a more complex encryption algorithm than other disk-encryption technologies.

D.
It can protect against single points of failure.

6 Comments on “What is an advantage of implementing a Trusted Platform Module for disk encryption?

  1. nageil says:

    After purchasing the dumps for the 210-260 Exam, I had no doubt that I’d easily pass the exam. Because it includes almost 90% real questions, I advise you have a try:
    QUESTION 91
    Which type of address translation should be used when a Cisco ASA is in transparent mode?

    A. Static NAT
    B. Dynamic NAT
    C. Overload
    D. Dynamic PAT

    Answer: A

    QUESTION 92
    Which components does HMAC use to determine the authenticity and integrity of a message? (Choose two.)

    A. The password
    B. The hash
    C. The key
    D. The transform set

    Answer: BC

    QUESTION 93
    What is the default timeout interval during which a router waits for responses from a TACACS server before declaring a timeout failure?

    A. 5 seconds
    B. 10 seconds
    C. 15 seconds
    D. 20 seconds

    Answer: A
    Explanation:
    Router(config)#tacacs-server timeout ?
    Wait time (default 5 seconds)

    QUESTION 94
    Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)

    A. EAP
    B. ASCII
    C. PAP
    D. PEAP
    E. MS-CHAPv1
    F. MS-CHAPv2

    Answer: CEF

    QUESTION 95
    Which command initializes a lawful intercept view?

    A. username cisco1 view lawful-intercept password cisco
    B. parser view cisco li-view
    C. li-view cisco user cisco1 password cisco
    D. parser view li-view inclusive

    Answer: C
    Explanation:
    Before you initialize a lawful intercept view, ensure that the privilege level is set to 15 via the privilege command.
    SUMMARY STEPS
    1. enable view
    2. configure terminal
    3. li-view li-password user username password password
    4. username lawful-intercept [name] [privilege privilege-level| view view-name] password password
    5. parser view view-name
    6. secret 5 encrypted-password
    7. name new-name

    QUESTION 96
    Which security measures can protect the control plane of a Cisco router? (Choose two.)

    A. CCPr
    B. Parser views
    C. Access control lists
    D. Port security
    E. CoPP

    Answer: AE
    Explanation:
    Table 10-3 Three Ways to Secure the Control Plane
    Using CoPP or CPPr, you can specify which types of management traffic are acceptable at which levels.
    For example, you could decide and configure the router to believe that SSH is acceptable at 100 packets per second, syslog is acceptable at 200 packets per second, and so on. Traffic that exceeds the thresholds can be safely dropped if it is not from one of your specific management stations.
    You can specify all those details in the policy.
    You learn more about control plane security in Chapter 13, “Securing Routing Protocols and the Control Plane.”
    Selective Packet Discard (SPD) provides the ability to
    Although not necessarily a security feature,
    prioritize certain types of packets (for example, routing protocol packets and Layer 2 keepalive messages, route processor [RP]). SPD provides priority of critical control plane traffic which are received by the
    over traffic that is less important or, worse yet, is being sent maliciously to starve the CPU of resources required for the RP.

    QUESTION 97
    Which statement about extended access lists is true?

    A. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destination
    B. Extended access lists perform filtering that is based on source and destination and are most effective when applied to the source
    C. Extended access lists perform filtering that is based on destination and are most effective when applied to the source
    D. Extended access lists perform filtering that is based on source and are most effective when applied to the destination

    Answer: B
    Explanation:
    Standard ACL
    1) Able Restrict, deny & filter packets by Host Ip or subnet only.
    2) Best Practice is put Std. ACL restriction near from Source Host/Subnet (Interface-In-bound).
    3) No Protocol based restriction. (Only HOST IP).
    Extended ACL
    1) More flexible then Standard ACL.
    2) You can filter packets by Host/Subnet as well as Protocol/TCPPort/UDPPort.
    3) Best Practice is put restriction near form Destination Host/Subnet. (Interface-Outbound)

    QUESTION 98
    Which protocols use encryption to protect the confidentiality of data transmitted between two parties? (Choose two.)

    A. FTP
    B. SSH
    C. Telnet
    D. AAA
    E. HTTPS
    F. HTTP

    Answer: BE

    QUESTION 99
    What are the primary attack methods of VLAN hopping? (Choose two.)

    A. VoIP hopping
    B. Switch spoofing
    C. CAM-table overflow
    D. Double tagging

    Answer: BD

    QUESTION 100
    How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?

    A. Issue the command anyconnect keep-installer under the group policy or username webvpn mode
    B. Issue the command anyconnect keep-installer installed in the global configuration
    C. Issue the command anyconnect keep-installer installed under the group policy or username webvpn mode
    D. Issue the command anyconnect keep-installer installer under the group policy or username webvpn mode

    Answer: C
    More details: https://drive.google.com/drive/u/0/folders/0B3Syig5i8gpDYUk3WWFWOEhsSU0




    1



    0

Leave a Reply