Grátis 281 pág.
Pré-visualização | Página 20 de 27or algorithm from the left column to it’s appropriate category on the right. Select and Place: Correct Answer: Section: (none) Explanation Explanation/Reference: Reference: https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html QUESTION 182 Which two options are the primary deployment models for mobile device management? (Choose two.) A. multisite B. hybrid cloud-based C. single-site D. on-premises E. cloud-based Correct Answer: DE Section: (none) Explanation Explanation/Reference: Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/ Unified_Access/BYOD_Design_Guide/BYOD_MDMs.html QUESTION 183 Which two characteristics apply to an Intrusion Prevention System (IPS)? (Choose two.) A. Does not add delay to the original traffic B. Cabled directly inline with the flow of the network traffic C. Can drop traffic based on a set of rules D. Cannot drop the packet on its own E. Runs in promiscuous mode Correct Answer: BE Section: (none) Explanation Explanation/Reference: QUESTION 184 What is a limitation of network-based IPS? A. It is most effective at the individual host level. B. Large installations require numerous sensors to fully protect the network. C. It is unable to monitor attacks across the entire network. D. It must be individually configured to support every operating system on the network. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 185 Which two actions can a zone-based firewall take when looking at traffic? (Choose two.) A. inspect B. forward C. drop D. filter E. broadcast Correct Answer: AC Section: (none) Explanation Explanation/Reference: Explanation: Traffic cannot flow between a zone member interface and any interface that is not a zone member. Pass, inspect, and drop actions can only be applied between two zones. Reference: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html QUESTION 186 Which two are the default settings for port security? (Choose two.) A. Violation is Protect B. Maximum number of MAC addresses is 1 C. Violation is Restrict D. Violation is Shutdown E. Maximum number of MAC addresses is 2 Correct Answer: BD Section: (none) Explanation Explanation/Reference: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/ guide/conf/port_sec.html QUESTION 187 Refer to the exhibit. Which area represents the data center? A. A B. B C. C D. D Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 188 Which quantifiable item should you consider when your organization adopts new technologies? A. exploits B. risk C. threats D. vulnerability Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 189 Refer to the exhibit. A network security administrator checks the ASA firewall NAT policy table with the show nat command. Which statement is false? A. First policy in the Section 1 is dynamic nat entry defined in the object configuration. B. There are only reverse translation matches for the REAL_SERVER object. C. NAT policy in Section 2 is a static entry defined in the object configuration. D. Translation in Section 3 is used when a connection does not match any entries in first two sections. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 190 How can you protect CDP from reconnaissance attacks? A. Enable dot1x on all ports that are connected to other switches. B. Disable CDP on trunk ports. C. Disable CDP on ports connected to endpoints. D. Enable dynamic ARP inspection on all untrusted ports. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 191 Which option is the cloud-based security service from Cisco that provides URL filtering, web browsing content security, and roaming user protection? A. Cloud Web Service B. Cloud Web Security C. Cloud Advanced Malware Protection D. Cloud Web Protection Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 192 Which IDS/IPS solution can monitor system processes and resources? A. IDS B. HIPS C. IPS D. PROXY Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation: HIPS audits host log files, host file systems, and resources. A significant advantage of HIPS is that it can monitor operating system processes and protect critical system resources, including files that may exist only on that specific host. QUESTION 193 Which option is the default value for the Diffie-Hellman group when configuring a site-to-site VPN on an ASA device? A. Group 7 B. Group 5 C. Group 1 D. Group 2 Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 194 Which type of attack can exploit design flaws in the implementation of an application without going noticed? A. volume-based DDoS attacks B. DHCP starvation attacks C. low-rate DoS attacks D. application DDoS flood attacks Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 195 Which two are characteristics of RADIUS? (Choose two.) A. Uses TCP ports 1812/1813 B. Uses UDP port 49 C. Encrypts only the password between user and server D. Uses TCP port 49 E. Uses UDP ports 1812/1813 Correct Answer: CE Section: (none) Explanation Explanation/Reference: QUESTION 196 Which two characteristics of symmetric encryption are true? (Choose two.) A. It is faster than asymmetric encryption. B. It uses digital certificates. C. It requires more resources than asymmetric encryption. D. It uses a public key and a private key to encrypt and decrypt traffic. E. It uses the same key to encrypt and decrypt traffic. Correct Answer: AE Section: (none) Explanation Explanation/Reference: QUESTION 197 Which two types of firewalls work at Layer 4 and above? (Choose two.) A. Application-level firewall B. Circuit-level gateway C. Static packet filter D. Network Address Translation E. Stateful inspection Correct Answer: AE Section: (none) Explanation Explanation/Reference: Reference: https://supportforums.cisco.com/t5/security-documents/firewall-and-types/ta-p/3112038 QUESTION 198 When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map? (Choose two.) A. nat B. peer C. pfs D. reverse-route E. transform-set Correct Answer: BE Section: (none) Explanation Explanation/Reference: Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_modules/6342/ vpn_cg/6342site3.html#wp1036915 QUESTION 199 Which mitigation technology for web-based threats prevents the removal of confidential data from the network? A. CTA B. AMP C. DLP D. DCA Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 200 What is the actual IOS privilege level of User Exec mode? A. 1 B. 0 C. 5 D. 15 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 201 Referencing the CIA model, in which scenario is a hash-only function most appropriate? A. securing data at rest B. securing wireless transmissions C. securing data in files D. securing real-time traffic Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 202 Which Firepower Management Center feature detects and blocks exploits and hack attempts? A. advanced malware protection B. intrusion prevention C. file control D. content blocker Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 203 Which IPS detection method can you use to detect attacks that are based on the attackers IP address? A. reputation-based B. signature-based C. policy-based D. anomaly-based Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 204 By default, how does a zone-based firewall handle traffic to and from the self zone? A. It inspects all traffic to determine how it is handled. B. What are the two characteristics of IPS and IDS sensors Choose two?1. What are two characteristics of both IPS and IDS sensors? (Choose two.) neither introduce latency or jitter both use signatures to detect patterns both are deployed inline in the data stream both can stop trigger packets both can detect atomic patterns Explanation: IDS sensors work off line and are passive.
What is an advantage of using an IPS?Intrusion prevention systems can provide protection for the availability and integrity of other enterprise security controls. For example, an IPS deployed in front of another enterprise security control can analyze the incoming network traffic and block suspicious activity from reaching that security control.
What is a feature of an IPS?IPS (Intrusion Prevention System) is a technology for securing networks by scanning and blocking malicious network traffic. By identifying suspicious activities and dropping packets, an IPS can help reduce the attack surface of an enterprise network.
|