What are the two characteristics of an IPS operating in promiscuous mode choose two?

Grátis

281 pág.

What are the two characteristics of an IPS operating in promiscuous mode choose two?

  • Denunciar


Pré-visualização | Página 20 de 27

or algorithm from the left column to it’s appropriate category on the right.
Select and Place:
Correct Answer: 
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
QUESTION 182
Which two options are the primary deployment models for mobile device management? (Choose two.)
A. multisite
B. hybrid cloud-based
C. single-site
D. on-premises
E. cloud-based
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/
Unified_Access/BYOD_Design_Guide/BYOD_MDMs.html
QUESTION 183
Which two characteristics apply to an Intrusion Prevention System (IPS)? (Choose two.)
A. Does not add delay to the original traffic
B. Cabled directly inline with the flow of the network traffic
C. Can drop traffic based on a set of rules
D. Cannot drop the packet on its own
E. Runs in promiscuous mode
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 184
What is a limitation of network-based IPS?
A. It is most effective at the individual host level.
B. Large installations require numerous sensors to fully protect the network.
C. It is unable to monitor attacks across the entire network.
D. It must be individually configured to support every operating system on the network.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 185
Which two actions can a zone-based firewall take when looking at traffic? (Choose two.)
A. inspect
B. forward
C. drop
D. filter
E. broadcast
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Traffic cannot flow between a zone member interface and any interface that is not a zone member. Pass,
inspect, and drop actions can only be applied between two zones.
Reference: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html
QUESTION 186
Which two are the default settings for port security? (Choose two.)
A. Violation is Protect
B. Maximum number of MAC addresses is 1
C. Violation is Restrict
D. Violation is Shutdown
E. Maximum number of MAC addresses is 2
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/
guide/conf/port_sec.html
QUESTION 187
Refer to the exhibit.
Which area represents the data center?
A. A
B. B
C. C
D. D
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 188
Which quantifiable item should you consider when your organization adopts new technologies?
A. exploits
B. risk
C. threats
D. vulnerability
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 189
Refer to the exhibit.
A network security administrator checks the ASA firewall NAT policy table with the show nat command.
Which statement is false?
A. First policy in the Section 1 is dynamic nat entry defined in the object configuration.
B. There are only reverse translation matches for the REAL_SERVER object.
C. NAT policy in Section 2 is a static entry defined in the object configuration.
D. Translation in Section 3 is used when a connection does not match any entries in first two sections.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 190
How can you protect CDP from reconnaissance attacks?
A. Enable dot1x on all ports that are connected to other switches.
B. Disable CDP on trunk ports.
C. Disable CDP on ports connected to endpoints.
D. Enable dynamic ARP inspection on all untrusted ports.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 191
Which option is the cloud-based security service from Cisco that provides URL filtering, web browsing
content security, and roaming user protection?
A. Cloud Web Service
B. Cloud Web Security
C. Cloud Advanced Malware Protection
D. Cloud Web Protection
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 192
Which IDS/IPS solution can monitor system processes and resources?
A. IDS
B. HIPS
C. IPS
D. PROXY
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
HIPS audits host log files, host file systems, and resources. A significant advantage of HIPS is that it can
monitor operating system processes and protect critical system resources, including files that may exist
only on that specific host.
QUESTION 193
Which option is the default value for the Diffie-Hellman group when configuring a site-to-site VPN on an
ASA device?
A. Group 7
B. Group 5
C. Group 1
D. Group 2
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 194
Which type of attack can exploit design flaws in the implementation of an application without going
noticed?
A. volume-based DDoS attacks
B. DHCP starvation attacks
C. low-rate DoS attacks
D. application DDoS flood attacks
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 195
Which two are characteristics of RADIUS? (Choose two.)
A. Uses TCP ports 1812/1813
B. Uses UDP port 49
C. Encrypts only the password between user and server
D. Uses TCP port 49
E. Uses UDP ports 1812/1813
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 196
Which two characteristics of symmetric encryption are true? (Choose two.)
A. It is faster than asymmetric encryption.
B. It uses digital certificates.
C. It requires more resources than asymmetric encryption.
D. It uses a public key and a private key to encrypt and decrypt traffic.
E. It uses the same key to encrypt and decrypt traffic.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 197
Which two types of firewalls work at Layer 4 and above? (Choose two.)
A. Application-level firewall
B. Circuit-level gateway
C. Static packet filter
D. Network Address Translation
E. Stateful inspection
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://supportforums.cisco.com/t5/security-documents/firewall-and-types/ta-p/3112038
QUESTION 198
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be
configured under crypto map? (Choose two.)
A. nat
B. peer
C. pfs
D. reverse-route
E. transform-set
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_modules/6342/
vpn_cg/6342site3.html#wp1036915
QUESTION 199
Which mitigation technology for web-based threats prevents the removal of confidential data from the
network?
A. CTA
B. AMP
C. DLP
D. DCA
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 200
What is the actual IOS privilege level of User Exec mode?
A. 1
B. 0
C. 5
D. 15
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 201
Referencing the CIA model, in which scenario is a hash-only function most appropriate?
A. securing data at rest
B. securing wireless transmissions
C. securing data in files
D. securing real-time traffic
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 202
Which Firepower Management Center feature detects and blocks exploits and hack attempts?
A. advanced malware protection
B. intrusion prevention
C. file control
D. content blocker
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 203
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?
A. reputation-based
B. signature-based
C. policy-based
D. anomaly-based
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 204
By default, how does a zone-based firewall handle traffic to and from the self zone?
A. It inspects all traffic to determine how it is handled.
B.

What are the two characteristics of IPS and IDS sensors Choose two?

1. What are two characteristics of both IPS and IDS sensors? (Choose two.) neither introduce latency or jitter  both use signatures to detect patterns both are deployed inline in the data stream both can stop trigger packets  both can detect atomic patterns Explanation: IDS sensors work off line and are passive.

What is an advantage of using an IPS?

Intrusion prevention systems can provide protection for the availability and integrity of other enterprise security controls. For example, an IPS deployed in front of another enterprise security control can analyze the incoming network traffic and block suspicious activity from reaching that security control.

What is a feature of an IPS?

IPS (Intrusion Prevention System) is a technology for securing networks by scanning and blocking malicious network traffic. By identifying suspicious activities and dropping packets, an IPS can help reduce the attack surface of an enterprise network.