Cisco SecureX is an access control strategy that allows for more effective, higher-level policy creation and enforcement for mobile users. Which of the following describes the Context awareness component?
A client needs to telecommute from home to the office, and requires a VPN connection. Only work related traffic should traverse the tunnel, Internet traffic should not. Which technology would allow for this operation?
Select the statements that represent threats to network infrastructure. (Choose four)
Which option is the term for the likelihood that a particular threat using a specific attack will exploit a particular vulnerability of a system that results in an undesirable consequence?
Which of the following describes the Crackers as a category of individuals who attack computer systems and operations?
What can be used to offload the processing of encrypted data? (Choose two)
Which of the following describes the function of Cisco ASA?
Which of the following describes the function of Cisco ISR?
A company opens a new mid-sized branch office. Which Cisco ESA models would ideally be deployed to this office? (Choose three)
Which of the following actions belong to the Operations and maintenance phase of the secure network life cycle? (Choose two)
Cisco SecureX is an access control strategy that allows for more effective, higher-level policy creation and enforcement for mobile users. Which of the following describes the Cisco SIO component?
Which failover configuration is only available on units that are running in multiple context mode when implementing high availability on the ASA?
Which statements accurately describe characteristics of the Cisco borderless networks architecture? (Choose two)
How is called the most time that a system resource can remain unavailable before there is an unacceptable effect?
Which of the following actions belong to the Disposition phase of the secure network life cycle? (Choose two)
You have noticed that an access switch is forwarding traffic out of all interfaces. Which type of attack is likely occurring?
Which of the following methods describes Network mapping attack?
What mode negotiates the IKE Phase 2 SAs?
A transform-set must be created with the name 'test'. It should also support data confidentiality using strong DES encryption. Enter the command that would accomplish this task.
What are the appropriate actions during a Preparation incident response phase? (Choose three)
Which of the following describes the function of Cisco ScanSafe?
When configuring firewall access rules, there are several things that need to be avoided, such as completeness issues, consistency issues, and compactness issues. What are two examples of completeness issues? (Choose two)
What is considered the number one criterion when classifying data for either the private or public sector?
You have learned that a Trojan was propagated to several servers in your network. However, no preventative action was taken by an IPS. What is this an example of?
Cisco SecureX is an access control strategy that allows for more effective, higher-level policy creation and enforcement for mobile users. Which of the following describes the Cisco TrustSec function component?
Which of the following describes the Hacktivists as a category of individuals who attack computer systems and operations?
What are the easiest methods for blocking access to a specific site? (Choose two)
Recently a bookmark was created but was misconfigured. The bookmark should allow access to a shared folder located on the Intranet. Which protocol would need to be configured to allow this type of connection?
Which of the following describes the Script kiddies as a category of individuals who attack computer systems and operations?
Which of the following describes the function of Cisco IPS?
Which of the following describes the Internal assessment?
In what ways can ACLs protect the data plane? (Choose five)
Which security features rely on DHCP snooping? (Choose two)
Which one of the following statements describes the DoS and DDoS Attacks?
Which three options are areas of router security? (Choose three)
Which statement about private VLANs is true?
There is currently an issue with some clients establishing an AnyConnect SSL VPN. The affected users differ from time to time. What could help explain this problem?
A sensitive document was recently accessed by an unauthorized user. Specifications about a new product were changed to erroneous data. Which security principle violations have occurred in this scenario? (Choose two)
You are planning a security policy for your network. Using the least amount of administrative effort, what should be included to help limit traffic from inside the network to outside of it?
Which statements about DHCP snooping are true? (Choose two)
Attacks may take a variety of forms. Which of the following describes the Enumeration and fingerprinting as a threat category?
Which option is the term for what happens when computer code is developed to take advantage of a vulnerability? For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.
Which statement is true regarding zone based firewalls in which traffic passes between zones?
Which actions belong to the operations and maintenance phase of the secure network life cycle? (Choose two)
What is defined as a collection of networks, reachable by specific interfaces on the router?
Which statements about routing update authentication are true? (Choose two)
You need to implement port security on an access switch. Each switch port must be able to dynamically learn the MAC addresses of the connected devices. If an unauthorized device is detected on an interface, that interface should be placed into an err-disabled state. Which commands should you enter? (Choose two)
Which of the actions are possible using Cisco Configuration Professional Express?
Which hash algorithm is vulnerable to collision attacks?
Threats to network security have become more sophisticated over the years. Identify the next generation threats facing organizations today. (Choose four)
A technician is setting up a SOHO for a client. The client will be using a VPN to connect to their office. Which routers are recommended for this topology? (Choose two)
Which of the following are Symmetric encryption algorithms? (Choose three)
Which statements describe the functions of the Security Audit feature? (Choose four)
Which of the following control plane security features allows users to configure a QoS filter to restrict the flow of control plane packets?
Which two statements are true regarding zones? (Choose two)