Which IDS/IPS solution can monitor system processes and resources?
Which IDS/IPS solution can monitor system processes and resources?A . IDSB . HIPSC . PROXYD . IPSView AnswerAnswer: B
Which IDS/IPS solution can monitor system processes and resources?A . IDSB . HIPSC . PROXYD . IPSView AnswerAnswer: B
What configuration allows AnyConnect to automatically establish a VPN session when a user logs in to the computer?A . always-onB . proxyC . transparent modeD . Trusted Network DetectionView AnswerAnswer: A Explanation: You can...
Which option is the resulting action in a zone-based policy firewall configuration with these conditions? A . no impact to zoning or policyB . no policy lookup (pass)C . dropD . apply default policyView...
Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most...
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first...
Which two actions can a zone based firewall take when looking at traffic? (Choose two)A . FilterB . ForwardC . DropD . BroadcastE . InspectView AnswerAnswer: C,E
What are the primary attack methods of VLAN hopping? (Choose two.)A . VoIP hoppingB . Switch spoofingC . CAM-table overflowD . Double taggingView AnswerAnswer: B,D Explanation: VLAN hopping is a computer security exploit, a...
What type of Diffie-Hellman group would you expect to be utiliazed on a wireless device?A . Group4B . Group7C . Group5D . Group3View AnswerAnswer: B
What features can protect the data plane? (Choose three.)A . policingB . ACLsC . IPSD . antispoofingE . QoSF . DHCP-snoopingView AnswerAnswer: B,D,F Explanation: + Block unwanted traffic at the router. If your corporate...
What is the command to authenticate an NTP time source?A . #ntp authentication-key 1 md5 141411050D 7B . #ntp authenticateC . #ntp trusted-key 1D . #ntp trusted-key 2View AnswerAnswer: B Explanation: ntp authentication-key,,,,Defines the...