nuts
Quiz
•
Education
•
University
•
Practice Problem
•
Easy
Ari Ari
Used 11+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?
Deploy a Cisco ASA.
Require remote access connections through IPsec VPN.
Deploy a Cisco SSL Appliance.
Use a Syslog server to capture network traffic.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?
Frames from PC1 will be forwarded to its destination, and a log entry will be created.
Frames from PC1 will be forwarded to its destination, but a log entry will not be created.
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
Frames from PC1 will be dropped, and there will be no log of the violation.
Frames from PC1 will be dropped, and a log message will be created
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security countermeasure is effective for preventing CAM table overflow attacks?
port security
IP source guard
Dynamic ARP Inspection
DHCP snooping
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two examples of DoS attacks? (Choose two.)
buffer overflow
ping of death
SQL injection
port scanning
phishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?
a security association
hashing algorithms
a permit access list entry
transform sets
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)
a valid access list
the ISAKMP policy
encryption
the peer
the hash
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?
Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.
Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network
Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.
Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
DEP-QUIZ-2
Quiz
•
University
10 questions
Marketing Environment
Quiz
•
University
15 questions
Curriculum design
Quiz
•
University
10 questions
Computer Networking
Quiz
•
University
10 questions
Pre Test Pemb Bahasa dan Sastra Indonesia di SD
Quiz
•
University
14 questions
Driving Test: Signs
Quiz
•
University
10 questions
Many vs Much
Quiz
•
1st Grade - Professio...
10 questions
Digital Marketing Race
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
