Sec Test 5
Which statement about Password Authentication Protocol is true?
RADIUS –based PAP authentication logs successful authentication attempts only.
Its password in encrypted with a certificate.
It offers strong protection against brute force attacks.
RADIUS –based PAP authentication is based on the RADIUS Password attribute
It is the most secure authentication method supported for authentication against the internal Cisco ISE database
It uses a two-way handshake with an encrypted password
In ISO 27002, access control code of practice for information security Management servers which of the following objective?
Educating employees on security requirement and issues
Optimize the adult process.
Prevent the physical damage of the resources.
Implement proper control of user, network and application access
Which three statements about communication between Cisco VSG and the VEM are true? (Choose three)
Layer 3 adjacency between Cisco VSG and the VEM requires communication through a VMkernel interface on the VEM
If vPath encapsulation of a packet in Layer 2 mode causes the packets to exceed the interface MTU size, it will be dropped.
VPath hands fragmentation for all adjacencies between Cisco VSG and the VEM
Cisco VSG and VEM should be adjacent at Layer 3 when minimal latency is required
In Layer 3 mode fragmentation with vPath is not supported.
VPath encapsulation of incoming packets can increase the frame size by up to 94 bytes.
Which statement about Health monitoring on the firepower system is true?
Descendant domains in a multi-domain deployment can view, edit, and apply policies from ancestor domains.
The administrator of a descendant domain is unable to edit or deleted blacklists applied by the administrator of an ancestor domains.
If you apply a policy without active modules to a device, the previous health policy remains in effect unless you delete it.
Health events are generated even when the health monitoring status is disabled
The default health policy is automatically applies to all managed devices.
When you delete a health policy that is applied to a device, the device reverts to the default health policy.
When you use the Firepower Management center to deploy an access control policy to a managed device, which process is restarted?
Mysqld
Snort
Crond
Reportd
Kupdate
Which statement about Cisco ISE guest portals is true?
To permit BYOD access, a guest portal must use RADIUS authentication.
The Sponsored –guest portal and Self-Registered Guest portal require a defined Endpoint identity Group
The Hotspot Guest portal can be configured for password –only authentication
If you delete a Guest portal without removing is authorization policy and profiles , they will be assigned automatically to the default guest portal
The Sponsored Guest portal allows guest user to create an account
When you make changes to an authorized Guest portal configuration, it must be reauthorized before the changes will take effect.
Refer the exhibit. What feature does the given configuration implement?
Dynamic ARP learning
DHCP snooping
DHCP Secured IP Address Assignment
ARP probing
What technique can an attacker use to obfuscate a malware application payload, allowing it to bypass standard security mechanisms?
Teredo tunneling
A PE32 header
Steganography
BASE64
Decryption
Which tunnel type does the Cisco unified Wireless Solution use to map a provisioned guest WLAN to an anchor WLC?
PEAP
IPsec
TLS
GRE
EAPoL
EoIP
Refer to the exhibit. Which effect of this configuration is true?
The MSS of TCP SYN packets is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes
The maximum size of TCP SYN+ACK packets passing the transient host is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes
SYN packets carry 1452 bytes in the payload when the Ethernet MTU of the interface is set to 1492 bytes
The PMTUD value set itself to 1452 bytes when the interface MTU is set to 1492 bytes
The minimum size of TCP SYN+ACK packets passing the router is set to 1452 bytes and the IP MTU of the interface is set to 1492 bytes
Which three statements about VXLAN are true? (Choose three)
It uses encrypted TCP/IP packets to transport data over the physical network
It enables up to 24 million VXLAN segments to coexist in the same administrative domain
It can migrate a virtual machine form one layer 2 domain to another over a Layer 3 network
It can converge topology without STP
It uses a 24-bit VXLAN network identifier to provide Layer 2 isolation between LAN segments
The VTEP encapsulates and de-encapsulates VXLAN traffic by adding or removing several fields, including a 16-bit VXLAN header
Which command sequence can you enter to enable IP multicast for WCCPv2?
Router(config)#ip wccp web-cache group-address 224.1.1.100
Router(config)# interface FastEthernet0/0
Router(config-if)#ip wccp web-cache redirect out
Router(config)#ip wccp web-cache group-list
Router(config)# interface FastEthernet0/0
Router(config)# ip wccp web-cache group-listen
Router(config)#ip wccp web-cache service-list
Router(config)# interface FastEthernet0/0
Router(config)# ip wccp web-cache group-listen
Router(config)#ip wccp web-cache group-address 224.1.1.100
Router(config)# interface FastEthernet0/0
Router(config)# ip wccp web-cache redirect in
Router(config)#ip wccp web-cache group-address 224.1.1.100
Router(config)# interface FastEthernet0/0
Router(config)# ip wccp web-cache group-listen
Which two statements about the Cognitive Threat Analytics feature of Cisco AMP for Web Security are true? (Choose two)
It can identify anomalous traffic within the network by comparing it to an established baseline of expected activity
It uses a custom virtual appliance to perform reputation-based evaluation and blocking of incoming files
It can locate and identity indicators of prior malicious activity on the network and preserve information for forensic analysis
It can identify anomalous traffic passing through the web gateway by comparing it to an established baseline of expected activity
It can identify potential data exfiltration
It can perform file analysis by sandboxing known malware and comparing unknown files to a local repository of threats
Which statement about the Firepower Security Intelligence feature is true?
It uses user-configured ACLs to blacklist and whitelist traffic
It can override custom whitelists to provide greater security against emerging threats
It filters traffic after policy-based inspection is complete and before the default action is taken
Blacklisted traffic is blocked without further inspection
It filters traffic after policy-based inspection is completed and the default action is taken
Which three statements about the SHA-2 algorithm are true? (Choose three)
It is used for integrity verification
It generates a 160-bit message digest
It is the collective term for the SHA-224, SHA-256, SHA-384, and SHA-512 algorithms
It generates a 512-bit message digest
It provides a fixed-length output using a collision-resistant cryptographic hash
It provides a variable-length output using a collision-resistant cryptographic hash
Which Cisco ASA firewall mode supports ASDM one-time password authentication using RSA SecureID?
Multiple-context mode
Network translation mode
Transparent mode
Single-context routed mode
Which statement about the Cisco AMP Virtual Private Cloud Appliance is true for deployments in cloud-proxy mode?
The appliance can perform disposition lookups against the Protect DB without an internet connection
The amp-sync tool syncs the threat-intelligence repository on the appliance on the AMP public cloud through the Update Host
The appliance can automatically download threat-intelligence updates directly from the AMP public cloud
The updates Host automatically downloads updates and deploys them to the Protect DB on a daily basis
The appliance communicates directly with the endpoint connectors only
When TCP intercept is enabled in its default mode, how does it react to a SYN request?
It intercepts the SYN before it reaches the server and responds with a SYN-ACK
It drops the connection
It monitors the attempted connection and drops it if it fails to establish within 30 seconds
It allows the connection without inspection
It monitors the sequence of SYN, SYN-ACK, and ACK messages until the connection is fully established
Which two parameters must be identical per interface while configuring virtual port channels (Choose two)
Network access control
IP sourceguard
Protocol independent multicast
Bridge Assurance setting
Maximum tranmission unit
Which IEFT standard is the most efficient messaging protocol used in a IoT network?
CoAP
MQTT
SNMP
HTTP
Which two characteristics of an IoT network are true? (Choose two)
IoT network must be designed for low-powered devicess
The transmission rate in an IoT network is consistent
IoT networks are 100% reliable
IoT networks use IS-IS for routing
IoT networks are bandwidth constrained
The peer is failing to respond
The crypto ACLs are mismatched
The pre-shared keys are mismatched
The transform sets are mismatched
{"name":"Sec Test 5", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which statement about Password Authentication Protocol is true?, In ISO 27002, access control code of practice for information security Management servers which of the following objective?, Which three statements about communication between Cisco VSG and the VEM are true? (Choose three)","img":"https://cdn.poll-maker.com/25-965454/screen-shot-2018-01-27-at-8-04-40-pm.png?sz=1200"}
More Quizzes
Literary Terms and Devices Review #4
7429
Avis quiz
940
Technology
210
Driver Recruitment Survey (Backup Quiz)
22110
Discover the Legacy of B.R. Ambedkar
158995
420
Biomes
210
Kvíz o Mariánovi Gáboríkovi
520
Thanksgiving Quiz
1260
Lecture 7
140700
Nilkanth Charitra chapters 13-19
191025
Can we guess what kind of digital news consumer you are based on 10 questions?
10519