Networ Security
Networ Security
▪ It is a root view.
▪ It is a CLI view without a command configured.
▪ It is a superview.
▪ It is a CLI view.
Explanation: From the root view, a network administrator can see a summary
of all role-based views by using the show parser view all command. An
asterisk identifies a superview.
17. What are two characteristics of the Cisco IOS Resilient Configuration
feature? (Choose two.)
▪ It maintains a mirror image of the configuration file in RAM.
▪ It sends a backup copy of the IOS image to a TFTP server.
▪ It saves a secure copy of the primary image and device configuration
that cannot be removed by a user.
▪ It minimizes the downtime of a device that has had the image and
configuration deleted.
▪ It is a universal feature that can be activated on all Cisco devices.
Explanation: The Cisco IOS Resilient Configuration stores a secure copy of
the primary image file and device configuration. These secure files cannot be
removed by a user. Its main function is to speed up the recovery time if a
device has been compromised and the image file and the device configuration
have been deleted. This feature is only available on platforms that support a
PCMCIA ATA disk with enough storage space.
18. What IOS privilege levels are available to assign for custom user-level
privileges?
▪ levels 1 through 15
▪ levels 0, 1, and 15
▪ levels 2 through 14
▪ levels 0 and 1
Explanation: There are 16 privilege levels that can be applied to user
accounts. Levels 0, 1, and 15 have predefined settings. This leaves levels 2
through 14 available for creating custom levels of access.
19. Refer to the exhibit. What information in the syslog message identifies
the facility?
▪ ADJCHG
▪ Loading Done
▪ OSPF
▪ level 5
Explanation: The facility is a service identifier used to categorize and identify
the messages being generated by a device using syslog. The facility of OSPF
identifies this syslog message as being from the OSPF protocol. Level 5 is the
severity level of this message. ADJCHG is the mnemonic to describe the
action occurring. Loading Done is part of the description of the event that
occurred.
20. What is the biggest issue with local implementation of AAA?
▪ Local implementation supports only TACACS+ servers.
▪ Local implementation cannot provide secure authentication.
▪ Local implementation does not scale well.
▪ Local implementation supports only RADIUS servers.
Explanation: One of the purposes of AAA is to provide secure authentication
to network devices. Local implementation does not use RADIUS or TACACS+
servers. It relies on a local database to authenticate all users. This can be a
problem in a network that has many devices with hundreds of users or more.
21. Which task is necessary to encrypt the transfer of data between the ACS
server and the AAA-enabled router?
▪ Configure the key exactly the same way on the server and the router.
▪ Specify the single-connection keyword.
▪ Create a VPN tunnel between the server and the router.
▪ Use identical reserved ports on the server and the router.
Explanation: The key command is used to configure the shared secret key
that is used for encryption. The key must be configured the exact same way on
the router and on the ACS server. The creation of a VPN tunnel is
unnecessary. Neither the configuration of ports nor the use of the single-
connection command has any effect on encryption.
22. Refer to the exhibit. Based on the output of the show running-config
command, which type of view is SUPPORT?
14. What is provided by the fail open and close functionality of Snort IPS?
▪ provides the ability to automatically disable problematic signatures that
routinely cause false positives and pass traffic
▪ blocks the traffic flow or bypasses IPS checking in the event of an IPS
engine failure
▪ keeps Snort current with the latest threat protection and term-based
subscriptions
▪ keeps track of the health of the Snort engine that is running in the
service container
Explanation: The Snort IPS fail open and close functionality can be configured
to block the traffic flow or to bypass IPS checking in the event of IPS engine
failure.
15. What is a characteristic of the Community Rule Set type of Snort term-
based subscriptions?
▪ it has 60-day delayed access to updated signatures
▪ it uses Cisco Talos to provide coverage in advance of exploits
▪ it is fully supported by Cisco
▪ it is available for free
Explanation: There are two types of Snort term-based subscriptions:
Community Rule Set – Available for free and provides limited coverage against
threats. There is also a 30-day delayed access to updated signatures and
there is no Cisco customer support available.
Subscriber Rule Set – Available for a fee and provides the best protection
against threats. It includes coverage in advance of exploits by using the
research work of the Cisco Talos security experts. This subscription is fully
supported by Cisco.
16. What is a characteristic of the connectivity policy setting when
configuring Snort threat protection?
▪ it attempts to balance network security with network performance
▪ it prioritizes security over connectivity
▪ it provides the lowest level of protection
▪ it enables the highest number of signatures to be verified
Explanation: One of the functionalities of Snort IPS is that it provides three
levels of signature protection.
Connectivity – The least secure option.
Balanced – The mid-range option of security.
Security – The most secure option.
17. What is contained in an OVA file?
▪ a current compilation of known threats and prevention mechanisms
▪ an installable version of a virtual machine
▪ a list of atomic and composite signatures
▪ a set of rules for an IDS or IPS to detect intrusion activity
Explanation: Step 1 of the configuration of Snort IPS is to download an Open
Virtualization Archive (OVA) file. This file contains a compressed, installable
version of a virtual machine.
18. What is a network tap?
▪ a Cisco technology that provides statistics on packets flowing through a
router or multilayer switch
▪ a technology used to provide real-time reporting and long-term analysis
of security events
▪ a feature supported on Cisco switches that enables the switch to copy
frames and forward them to an analysis device
▪ a passive device that forwards all traffic and physical layer errors to
an analysis device
Explanation: A network tap is used to capture traffic for monitoring the
network. The tap is typically a passive splitting device implemented inline on
the network and forwards all traffic, including physical layer errors, to an
analysis device.
19. Which statement describes the function of the SPAN tool used in a Cisco
switch?
▪ It is a secure channel for a switch to send logging to a syslog server.
▪ It provides interconnection between VLANs over multiple switches.
▪ It supports the SNMP trap operation on a switch.
▪ It copies the traffic from one switch port and sends it to another
switch port that is connected to a monitoring device.
Explanation: To analyze network traffic passing through a switch, switched
port analyzer (SPAN) can be used. SPAN can send a copy of traffic from one
port to another port on the same switch where a network analyzer or
monitoring device is connected. SPAN is not required for syslog or SNMP.
SPAN is used to mirror traffic, while syslog and SNMP are configured to send
data directly to the appropriate server.
20. A network administrator is trying to download a valid file from an
internal server. However, the process triggers an alert on a NMS tool. What
condition describes this alert?
▪ false negative
▪ false positive
▪ true negative
▪ true positive
Explanation: Alerts can be classified as follows:
True Positive: The alert has been verified to be an actual security incident.
False Positive: The alert does not indicate an actual security incident. Benign
activity that results in a false positive is sometimes referred to as a benign
trigger.
An alternative situation is that an alert was not generated. The absence of an
alert can be classified as:
True Negative: No security incident has occurred. The activity is benign.
False Negative: An undetected incident has occurred.
21. What is an advantage of HIPS that is not provided by IDS?
▪ HIPS provides quick analysis of events through detailed logging.
▪ HIPS deploys sensors at network entry points and protects critical
network segments.
▪ HIPS monitors network processes and protects critical files.
▪ HIPS protects critical system resources and monitors operating
system processes.
Explanation: Network-based IDS (NIDS) sensors are typically deployed in
offline mode. They do not protect individual hosts. Host-based IPS (HIPS) is
software installed on a single host to monitor and analyze suspicious activity. It
can monitor and protect operating system and critical system processes that
are specific to that host. HIPS can be thought of as a combination of antivirus
software, antimalware software, and a firewall.
22. What information must an IPS track in order to detect attacks matching
a composite signature?
▪ the total number of packets in the attack
▪ the state of packets related to the attack
▪ the attacking period used by the attacker
▪ the network bandwidth consumed by all packets
Explanation: A composite signature is called a stateful signature. It identifies a
sequence of operations distributed across multiple hosts over an arbitrary
period of time. Because this type of attack involves multiple packets, an IPS
sensor must maintain the state information. However, an IPS sensor cannot
maintain the state information indefinitely. A composite signature is configured
with a time period to maintain the state for the specific attack when it is first
detected. Thus, an IPS may not be able to maintain all the information related
to an attack such as total number of packets, total length of attack time, and
the amount of bandwidth consumed by the attack.
20. Which term describes the role of a Cisco switch in the 802.1X port-based
access control?
▪ agent
▪ supplicant
▪ authenticator
▪ authentication server
Explanation: 802.1X port-based authentication defines specific roles for the
devices in the network:
Client (Supplicant) – The device that requests access to LAN and switch
services
Switch (Authenticator) – Controls physical access to the network based on
the authentication status of the client
Authentication server – Performs the actual authentication of the client
21. What type of data does the DLP feature of Cisco Email Security Appliance
scan in order to prevent customer data from being leaked outside of the
company?
▪ inbound messages
▪ outbound messages
▪ messages stored on a client device
▪ messages stored on the email server
Explanation: Cisco ESAs control outbound messages through data-loss
prevention (DLP), email encryption, and optional integration with the RSA
Enterprise Manager. This control helps ensure that the outbound messages
comply with industry standards and are protected in transit.
22. What is the goal of the Cisco NAC framework and the Cisco NAC
appliance?
▪ to ensure that only hosts that are authenticated and have had their
security posture examined and approved are permitted onto the
network
▪ to monitor data from the company to the ISP in order to build a real-time
database of current spam threats from both internal and external
sources
▪ to provide anti-malware scanning at the network perimeter for both
authenticated and non-authenticated devices
▪ to provide protection against a wide variety of web-based threats,
including adware, phishing attacks, Trojan horses, and worms
Explanation: The NAC framework uses the Cisco network infrastructure and
third-party software to ensure the wired and wireless endpoints that want to
gain access to the network adheres to the requirements defined by the
security policy. The Cisco NAC Appliance is the device that enforces security
policy compliance.
23. Which Cisco solution helps prevent MAC and IP address spoofing
attacks?
▪ Port Security
▪ DHCP Snooping
▪ IP Source Guard
▪ Dynamic ARP Inspection
Explanation: Cisco provides solutions to help mitigate Layer 2 attacks
including:
▪ IPSource Guard (IPSG) – prevents MAC and IP address spoofing
attacks
▪ Dynamic ARP Inspection (DAI) – prevents ARP spoofing and ARP
poisoning attacks
▪ DHCP Snooping – prevents DHCP starvation and SHCP spoofing
attacks
▪ Port Security – prevents many types of attacks including MAC table
overflow attacks and DHCP starvation attacks
24. What Layer 2 attack is mitigated by disabling Dynamic Trunking
Protocol?
▪ VLAN hopping
▪ DHCP spoofing
▪ ARP poisoning
▪ ARP spoofing
Explanation: Mitigating a VLAN hopping attack can be done by disabling
Dynamic Trunking Protocol (DTP) and by setting the native VLAN of trunk links
to VLANs not in use.
25. What is the result of a DHCP starvation attack?
▪ Legitimate clients are unable to lease IP addresses.
▪ Clients receive IP address assignments from a rogue DHCP server.
▪ The attacker provides incorrect DNS and default gateway information to
clients.
▪ The IP addresses assigned to legitimate clients are hijacked.
Explanation: DCHP starvation attacks are launched by an attacker with the
intent to create a DoS for DHCP clients. To accomplish this goal, the attacker
uses a tool that sends many DHCPDISCOVER messages to lease the entire
pool of available IP addresses, thus denying them to legitimate hosts.
26. A network administrator is configuring DAI on a switch with the
command ip arp inspection validate dst-mac . What is the purpose of this
configuration command?
▪ to check the destination MAC address in the Ethernet header against
the MAC address table
▪ to check the destination MAC address in the Ethernet header against
the user-configured ARP ACLs
▪ to check the destination MAC address in the Ethernet header against
the target MAC address in the ARP body
▪ to check the destination MAC address in the Ethernet header against
the source MAC address in the ARP body
Explanation: DAI can be configured to check for both destination or source
MAC and IP addresses:
Destination MAC – Checks the destination MAC address in the Ethernet
header against the target MAC address in the ARP body.
Source MAC – Checks the source MAC address in the Ethernet header
against the sender MAC address in the ARP body.
IP address – Checks the ARP body for invalid and unexpected IP addresses
including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.
▪ MD5
▪ AES
▪ SHA
▪ DH
Explanation: Two popular algorithms that are used to ensure that data is not
intercepted and modified (data integrity) are MD5 and SHA. The command
Router1(config-isakmp)# hash sha indicates that SHA is being used. AES is
an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is
an algorithm that is used for key exchange. RSA is an algorithm used for
authentication.
20. Two corporations have just completed a merger. The network engineer
has been asked to connect the two corporate networks without the expense
of leased lines. Which solution would be the most cost effective method of
providing a proper and secure connection between the two corporate
networks?
▪ Cisco AnyConnect Secure Mobility Client with SSL
▪ Cisco Secure Mobility Clientless SSL VPN
▪ Frame Relay
▪ remote access VPN using IPsec
▪ site-to-site VPN
Explanation: The site-to-site VPN is an extension of a classic WAN network
that provides a static interconnection of entire networks. Frame Relay would
be a better choice than leased lines, but would be more expensive than
implementing site-to-site VPNs. The other options refer to remote access
VPNs which are better suited for connecting users to the corporate network
versus interconnecting two or more networks.
21. Refer to the exhibit. What show command displays whether the
securityk9 software is installed on the router and whether the EULA license
has been activated?
▪ show running-config
▪ show version
▪ show interfaces s0/0/0
▪ show crypto isakmp policy 1
Explanation: The show version command displays the status of technology
packages on the router. Based on the partial output shown, the router software
already includes ipbasek9 and securityk9. The EvalRightToUse parameter
shows that the license is active thereby giving access to the cryptographic
features, IPsec and ISAKMP, required to create an IPsec VPN.
22. What type of traffic is supported by IPsec?
▪ IPsec supports all IPv4 traffic.
▪ IPsec supports layer 2 multicast traffic.
▪ IPsec supports all traffic permitted through an ACL.
▪ IPsec only supports unicast traffic.
Explanation: IPsec only supports unicast traffic. If multicast traffic needs to
travel through a tunnel, a GRE tunnel will need to be configured between the
peers.
1. A network analyst wants to monitor the activity of all new interns. Which
type of security testing would track when the interns sign on and sign off
the network?
▪ vulnerability scanning
▪ password cracking
▪ network scanning
▪ integrity checker
Explanation: An integrity checking system can report login and logout
activities. Network scanning can detect user names, groups, and shared
resources by scanning listening TCP ports. Password cracking is used to test
and detect weak passwords. Vulnerability scanning can detect potential
weaknesses in a system, such as misconfigurations, default passwords, or
DoS attack targets.
2. What are three characteristics of SIEM? (Choose three.)
▪ can be implemented as software or as a service
▪ Microsoft port scanning tool designed for Windows
▪ examines logs and events from systems and applications to detect
security threats
▪ consolidates duplicate event data to minimize the volume of gathered
data
▪ uses penetration testing to determine most network vulnerabilities
▪ provides real-time reporting for short-term security event analysis
Explanation: Security Information Event Management (SIEM) is a technology
that provides real-time reporting and long-term analysis of security events.
SIEM provides the ability to search logs and events from disparate systems or
applications to detect threats. SIEM aggregates duplicate events to reduce the
volume of event data. SIEM can be implemented as software or as a
managed.service. SuperScan is a Microsoft Windows port scanning tool that
runs on most versions of Windows.Tools, such as Nmap and SuperScan, can
provide effective penetration testing on a network and determine network
vulnerabilities while helping to anticipate possible attack mechanisms.
3. What testing tool is available for network administrators who need a GUI
version of Nmap?
▪ SuperScan
▪ SIEM
▪ Nessus
▪ Zenmap
Explanation: Nmap and Zenmap are low-level network scanners available to
the public. Zenmap is the GUI version of Nmap. SuperScan is a Microsoft port
scanning software that detects open TCP and UDP ports on systems. Nessus
can scan systems for software vulnerabilities. SIEM is used to provide real-
time reporting of security events.
4. What is the goal of network penetration testing?
▪ determining the feasibility and the potential consequences of a
successful attack
▪ detecting potential weaknesses in systems
▪ detecting configuration changes on network systems
▪ detecting weak passwords
Explanation: There are many security tests that can be used to assess a
network. Penetration testing is used to determine the possible consequences
of successful attacks on the network. Vulnerability scanning can detect
potential weaknesses in systems. Password cracking can detect weak
passwords. Integrity checkers can detect and report configuration changes.
5. How does network scanning help assess operations security?
▪ It can detect open TCP ports on network systems.
▪ It can detect weak or blank passwords.
▪ It can simulate attacks from malicious sources.
▪ It
can log abnormal activity.
Explanation: Network scanning can help a network administrator strengthen
the security of the network and systems by identifying open TCP and UDP
ports that could be targets of an attack.
6. What are three characteristics of the ASA routed mode? (Choose three.)
▪ This mode is referred to as a “bump in the wire.”
▪ In this mode, the ASA is invisible to an attacker.
▪ The interfaces of the ASA separate Layer 3 networks and require
different IP addresses in different subnets.
▪ It is the traditional firewall deployment mode.
▪ This mode does not support VPNs, QoS, or DHCP Relay.
▪ NAT can be implemented between connected networks.
Explanation: Routed mode is the traditional mode for deploying a firewall
where there are two or more interfaces that separate Layer 3 networks. The
ASA is considered to be a router hop in the network and can perform NAT
between connected networks. Routed mode supports multiple interfaces. Each
interface is on a different subnet and requires an IP address on that subnet.
7. In which two instances will traffic be denied as it crosses the ASA 5505
device? (Choose two.)
▪ traffic originating from the inside network going to the DMZ network
▪ traffic originating from the inside network going to the outside network
▪ traffic originating from the outside network going to the DMZ network
▪ traffic originating from the DMZ network going to the inside network
▪ traffic originating from the outside network going to the inside
network
Explanation: When an ASA 5505 device is being utilized, traffic is denied as it
travels from a lower security zone to a higher security zone. The highest
security zone is the internal network, the DMZ is usually the next highest, and
the outside network is the lowest. Traffic is only allowed to move from a lower
security level to a higher if it is in response to originating traffic within the
higher security zone.
8. Refer to the exhibit. Based on the security levels of the interfaces on the
ASA, what statement correctly describes the flow of traffic allowed on the
interfaces?
▪ Traffic that is sent from the LAN and the Internet to the DMZ is
considered inbound.
▪ Traffic that is sent from the DMZ and the Internet to the LAN is
considered outbound.
▪ Traffic that is sent from the LAN to the DMZ is considered inbound.
▪ Traffic that is sent from the LAN to the DMZ is considered is considered
inbound.
▪ Traffic that is sent from the DMZ and the LAN to the Internet is
considered outbound.
Explanation: When traffic moves from an interface with a higher security level
to an interface with a lower security level, it is considered outbound traffic.
Conversely, traffic that moves from an interface with a lower security level to
an interface with a higher security level is considered inbound traffic.
9. Refer to the exhibit. A network administrator is configuring the security
level for the ASA. Which statement describes the default result if the
administrator tries to assign the Inside interface with the same security
level as the DMZ interface?
▪ The ASA allows inbound traffic initiated on the Internet to the DMZ, but
not to the Inside interface.
▪ The ASA console will display an error message.
▪ The ASA will not allow traffic in either direction between the Inside
interface and the DMZ.
▪ The ASA allows traffic from the Inside to the DMZ, but blocks traffic
initiated on the DMZ to the Inside interface.
Explanation: Multiple interfaces in an ASA can be assigned the same security
level. To allow connectivity between interfaces with the same security levels,
the same-security-traffic permit inter-interface global configuration command is
required. Traffic from the higher level network to the lower level network is
allowed by default. However, traffic initiated on the lower level network is
denied access to the higher level network by default.
10. What can be configured as part of a network object?
▪ interface type
▪ IP address and mask
▪ upper layer protocol
▪ source and destination MAC address
Explanation: There are two types of objects that can be configured on the
Cisco ASA 5505: network objects and service objects. Network objects can be
configured with an IP address and mask. Service objects can be configured
with a protocol or port ranges.
11. What is the function of a policy map configuration when an ASA firewall
is being configured?
▪ binding a service policy to an interface
▪ binding class maps with actions
▪ identifying interesting traffic
▪ using ACLs to match traffic
Explanation: Policy maps are used to bind class maps with actions Class
maps are configured to identify Layer 3 and 4 traffic. Service policies are
configured to attach the policy map to an interface.
12. What is the purpose of configuring an IP address on an ASA device in
transparent mode?
▪ management
▪ routing
▪ NAT
▪ VPN connectivity
Explanation: An ASA device configured in transparent mode functions like a
Layer 2 device and does not support dynamic routing protocols, VPNs, QoS,
or DHCP.
13. Which license provides up to 50 IPsec VPN users on an ASA 5506-X
device?
▪ the most commonly pre-installed Base license
▪ a purchased Security Plus upgrade license
▪ a purchased Base license
▪ a purchased AnyConnect Premium license
Explanation: The ASA 5506-X commonly has a pre-installed Base license that
has the option to upgrade to the Security Plus license. The Security Plus
license supports a higher connection capacity and up to 50 IPsec VPN users.
14. What mechanism is used by an ASA device to allow inspected outbound
traffic to return to the originating sender who is on an inside network?
▪ access control lists
▪ Network Address Translation
▪ security zones
▪ stateful packet inspection
Explanation: Stateful packet inspection allows return traffic that is sourced on
the outside network to be received by the originating sender on the internal
network.
15. When configuring interfaces on an ASA, which two pieces of information
must be included? (Choose two.)
▪ group association
▪ service level
▪ FirePower version
▪ security level
▪ access list
▪ name
Explanation: When configuring an ASA, each operational interface must have
a name and a security level from 0 (lowest) to 100 (highest) assigned.
16. Refer to the exhibit. A network administrator is verifying the security
configuration of an ASA. Which command produces the exhibited output?
▪ show vlan
▪ show ip interface brief
▪ show interface ip brief
▪ show switch vlan
Explanation: Use the show interface ip brief command to verify IP address
assignment and interface status on an ASA.
17. What interface configuration command is used on an ASA to request an
IP address from an upstream DSL device?
▪ ip address ip-address netmask
▪ ip address dhcp setroute
▪ dhcpd address IP_address1 [ -IP_address2 ] if_name
▪ ip address pppoe
Explanation: Configuring IP addresses on interfaces can be done manually
using the ip address command. It can also be accomplished by using DHCP
when an interface is connecting to an upstream device providing DHCP
services. PPPoE is used when an interface is connecting to an upstream DSL
device providing point-to-point connectivity over Ethernet services. The dhcpd
address IP_address1 [ -IP_address2 ] if_name command is used to establish the
IP address pool on a DHCP server.
18. Refer to the exhibit. What kind of NAT is configured on the ASA device?
▪ dynamic NAT
▪ Twice NAT
▪ dynamic PAT
▪ static NAT
Explanation: From the configuration, the source of IP address translation is
the subnet 192.168.5.0/27 and the mapped address is the outside interface.
This is an example of dynamic PAT. Dynamic NAT, dynamic PAT, and static
NAT are referred to as “network object NAT” because the configuration
requires network objects to be configured. Twice NAT identifies both the
source and destination address in a single rule ( nat command), and it is used
when configuring remote-access IPsec and SSL VPNs.
19. What is the purpose of the Tripwire network testing tool?
▪ to perform vulnerability scanning
▪ to provide information about vulnerabilities and aid in penetration testing
and IDS signature development
▪ to assess configuration against established policies, recommended
best practices, and compliance standards
▪ to detect unauthorized wired network access
▪ to provide password auditing and recovery
Explanation: The Nesus tool provides remote vulnerability scanning that
focuses on remote access, password misconfiguration, and DoS against the
TCP/IP stack. L0phtcrack provides password auditing and recovery. Metasploit
provides information about vulnerabilities and aids in penetration testing and
IDS signature development.
20. A network analyst is testing the security of the systems and networks of
a corporation. What tool could be used to audit and recover passwords?
▪ L0phtCrack
▪ SuperScan
▪ Nessus
▪ Metasploit
Explanation: Some of the software tools that can be used to perform network
testing include:
SuperScan – port scanning software designed to detect open TCP and UDP
ports and to determine what services are running on those ports
Nessus – vulnerability scanning software that focuses on remote access,
misconfigurations, and DoS against the TCP/IP stack
L0phtCrack – a password auditing and recovery application
Metasploit – provides information about vulnerabilities and aids in penetration
testing and IDS signature development
21. In which two instances will traffic be denied as it crosses the ASA 5506-X
device? (Choose two.)
▪ traffic originating from the inside network going to the outside network
▪ traffic originating from the inside network going to the DMZ network
▪ traffic originating from the outside network going to the inside
network
▪ traffic originating from the outside network going to the DMZ network
▪ traffic originating from the DMZ network going to the inside network
Explanation: When an ASA 5506-X device is being utilized, traffic is denied as
it travels from a lower security zone to a higher security zone. The highest
security zone is the internal network, the DMZ is usually the next highest, and
the outside network is the lowest. Traffic is only allowed to move from a lower
security level to a higher if it is in response to originating traffic within the
higher security zone.
1. Match the type of ASA ACLs to the description. (Not all options are used.)
2. Which statement describes a difference between the Cisco ASA IOS CLI
feature and the router IOS CLI feature?
▪ ASA uses the ? command whereas a router uses the help command to
receive help on a brief description and the syntax of a command.
▪ To use a show command in a general configuration mode, ASA can use
the command directly whereas a router will need to enter the do
command before issuing the show command.
▪ To complete a partially typed command, ASA uses the Ctrl+Tab key
combination whereas a router uses the Tab key.
▪ To indicate the CLI EXEC mode, ASA uses the % symbol whereas a
router uses the # symbol.
Explanation: The ASA CLI is a proprietary OS which has a similar look and
feel to the Cisco router IOS. Although it shares some common features with
the router IOS, it has its unique features. For example, an ASA CLI command
can be executed regardless of the current configuration mode prompt. The
IOS do command is not required or recognized. Both the ASA CLI and the
router CLI use the # symbol to indicate the EXEC mode. Both CLIs use the
Tab key to complete a partially typed command. Different from the router IOS,
the ASA provides a help command that provides a brief command description
and syntax for certain commands.
3. Refer to the exhibit. A network administrator is configuring AAA
implementation on an ASA device. What does the option link3 indicate?
▪ All login attempts will be blocked for 150 seconds if there are 4 failed
attempts within 90 seconds.
▪ All login attempts will be blocked for 90 seconds if there are 4 failed
attempts within 150 seconds.
▪ All login attempts will be blocked for 1.5 hours if there are 4 failed
attempts within 150 seconds.
▪ All login attempts will be blocked for 4 hours if there are 90 failed
attempts within 150 seconds.
Explanation: The components of the login block-for 150 attempts 4 within 90
command are as follows:
The expression block-for 150 is the time in seconds that logins will be blocked.
The expression attempts 4 is the number of failed attempts that will trigger the
blocking of login requests.
The expression within 90 is the time in seconds in which the 4 failed attempts
must occur.
9. Which two tasks are associated with router hardening? (Choose two.)
▪ placing the router in a secure room
▪ disabling unused ports and interfaces
▪ installing the maximum amount of memory possible
▪ securing administrative access
▪ using uninterruptible power supplies
10. Which threat protection capability is provided by Cisco ESA?
▪ web filtering
▪ cloud access security
▪ spam protection
▪ Layer4 traffic monitoring
Explanation: Email is a top attack vector for security breaches. Cisco ESA
includes many threat protection capabilities for email such as spam protection,
forged email detection, and Cisco advanced phishing protection.
11. What are two security measures used to protect endpoints in the
borderless network? (Choose two.)
▪ denylisting
▪ Snort IPS
▪ DLP
▪ DMZ
▪ rootkit
Explanation:
Measure Purpose
antimalware
software Protect endpoints from malware.
data loss
prevention (DLP) Prevent sensitive information from being lost or stolen.
12. Which three types of traffic are allowed when the authentication port-
control auto command has been issued and the client has not yet been
authenticated? (Choose three.)
▪ CDP
▪ 802.1Q
▪ IPsec
▪ TACACS+
▪ STP
▪ EAPOL
Explanation: Until the workstation is authenticated, 802.1X access control
enables only Extensible Authentication Protocol over LAN (EAPOL), Cisco
Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through
the port to which the workstation is connected. After authentication succeeds,
normal traffic can pass through the port.
13. Which statement describes a characteristic of the IKE protocol?
▪ It uses UDP port 500 to exchange IKE information between the
security gateways.
▪ IKE Phase 1 can be implemented in three different modes: main,
aggressive, or quick.
▪ It allows for the transmission of keys directly across a network.
▪ The purpose of IKE Phase 2 is to negotiate a security association
between two IKE peers.
14. Which action do IPsec peers take during the IKE Phase 2 exchange?
▪ exchange of DH keys
▪ negotiation of IPsec policy
▪ negotiation of IKE policy sets
▪ verification of peer identity
Explanation: The IKE protocol executes in two phases. During Phase 1 the
two sides negotiate IKE policy sets, authenticate each other, and set up a
secure channel. During the second phase IKE negotiates security associations
between the peers.
15. What are two hashing algorithms used with IPsec AH to guarantee
authenticity? (Choose two.)
▪ SHA
▪ RSA
▪ DH
▪ MD5
▪ AES
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. Two popular algorithms used to ensure that data is not intercepted
and modified (data integrity and authenticity) are MD5 and SHA.
16. Which command raises the privilege level of the ping command to 7?
▪ user exec ping level 7
▪ authorization exec ping level 7
▪ accounting exec level 7 ping
▪ privilege exec level 7 ping
17. What is a characteristic of a role-based CLI view of router configuration?
▪ A CLI view has a command hierarchy, with higher and lower views.
▪ When a superview is deleted, the associated CLI views are deleted.
▪ A single CLI view can be shared within multiple superviews.
▪ Only a superview user can configure a new view and add or remove
commands from the existing views.
Explanation: A CLI view has no command hierarchy, and therefore, no higher
or lower views. Deleting a superview does not delete the associated CLI
views. Only a root view user can configure a new view and add or remove
commands from the existing views.
18. What is a limitation to using OOB management on a large enterprise
network?
▪ Production traffic shares the network with management traffic.
▪ Terminal servers can have direct console connections to user devices
needing management.
▪ OOB management requires the creation of VPNs.
▪ All devices appear to be attached to a single management network.
Explanation: OOB management provides a dedicated management network
without production traffic. Devices within that network, such as terminal
servers, have direct console access for management purposes. Because in-
band management runs over the production network, secure tunnels or VPNs
may be needed. Failures on the production network may not be communicated
to the OOB network administrator because the OOB management network
may not be affected
19. Refer to the exhibit. A corporate network is using NTP to synchronize
the time across devices. What can be determined from the displayed
output?
37. Match each IPS signature trigger category with the description.
Other case:
44. How does a firewall handle traffic when it is originating from the private
network and traveling to the DMZ network?
▪ The traffic is selectively denied based on service requirements.
▪ The traffic is usually permitted with little or no restrictions.
▪ The traffic is selectively permitted and inspected.
▪ The traffic is usually blocked.
Explanation: With a three interface firewall design that has internal, external,
and DMZ connections, typical configurations include the following:
– Traffic originating from DMZ destined for the internal network is normally
blocked.
– Traffic originating from the DMZ destined for external networks is typically
permitted based on what services are being used in the DMZ.
– Traffic originating from the internal network destined from the DMZ is
normally inspected and allowed to return.
– Traffic originating from external networks (the public network) is typically
allowed in the DMZ only for specific services.
45. Which two protocols generate connection information within a state
table and are supported for stateful filtering? (Choose two.)
▪ ICMP
▪ UDP
▪ DHCP
▪ TCP
▪ HTTP
46. Which type of firewall is supported by most routers and is the easiest to
implement?
▪ next generation firewall
▪ stateless firewall
▪ stateful firewall
▪ proxy firewall
Explanation: Packet Filtering (Stateless) Firewall uses a simple policy table
look-up that filters traffic based on specific criteria and is considered the
easiest firewall to implement.
47. What network testing tool would an administrator use to assess and
validate system configurations against security policies and compliance
standards?
▪ Tripwire
▪ L0phtcrack
▪ Nessus
▪ Metasploit
Explanation: Tripwire – This tool assesses and validates IT configurations
against internal policies, compliance standards, and security best practices.
48. What type of network security test can detect and report changes made
to network systems?
▪ vulnerability scanning
▪ network scanning
▪ integrity checking
▪ penetration testing
Explanation: Integrity checking is used to detect and report changes made to
systems. Vulnerability scanning is used to find weaknesses and
misconfigurations on network systems. Network scanning is used to discover
available resources on the network.
49. What network security testing tool has the ability to provide details on
the source of suspicious network activity?
▪ SIEM
▪ SuperScan
▪ Zenmap
▪ Tripwire
50 How do modern cryptographers defend against brute-force attacks?
▪ Use statistical analysis to eliminate the most common encryption keys.
▪ Use a keyspace large enough that it takes too much money and too
much time to conduct a successful attack.
▪ Use an algorithm that requires the attacker to have both ciphertext and
plaintext to conduct a successful attack.
▪ Use frequency analysis to ensure that the most popular letters used in
the language are not used in the cipher message.
Explanation: In a brute-force attack, an attacker tries every possible key with
the decryption algorithm knowing that eventually one of them will work. To
defend against the brute-force attacks, modern cryptographers have as an
objective to have a keyspace (a set of all possible keys) large enough so that it
takes too much money and too much time to accomplish a brute-force attack.
A security policy requiring passwords to be changed in a predefined interval
further defend against the brute-force attacks. The idea is that passwords will
have been changed before an attacker exhausts the keyspace.
51. How does a Caesar cipher work on a message?
▪ Letters of the message are replaced by another letter that is a set
number of places away in the alphabet.
▪ Letters of the message are rearranged randomly.
▪ Letters of the message are rearranged based on a predetermined
pattern.
▪ Words of the message are substituted based on a predetermined
pattern.
52. What is the main factor that ensures the security of encryption of
modern algorithms?
▪ complexity of the hashing algorithm
▪ the use of 3DES over AES
▪ secrecy of the keys
▪ secrecy of the algorithm
Explanation: With most modern algorithms, successful decryption requires
knowledge of the appropriate cryptographic keys. This means that the security
of encryption lies in the secrecy of the keys, not the algorithm.
53 What is the next step in the establishment of an IPsec VPN after IKE
Phase 1 is complete?
▪ negotiation of the ISAKMP policy
▪ negotiation of the IPsec SA policy
▪ detection of interesting traffic
▪ authentication of peers
Explanation: Establishing an IPsec tunnel involves five steps:
detection of interesting traffic defined by an ACL
IKE Phase 1 in which peers negotiate ISAKMP SA policy
IKE Phase 2 in which peers negotiate IPsec SA policy
Creation of the IPsec tunnel
Termination of the IPsec tunnel
54. Refer to the exhibit. What algorithm will be used for providing
confidentiality?
▪ RSA
▪ Diffie-Hellman
▪ DES
▪ AES
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. Two popular algorithms that are used to ensure that data is not
intercepted and modified (data integrity) are MD5 and SHA. AES is an
encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an
algorithm that is used for key exchange. RSA is an algorithm used for
authentication.
55. After issuing a show run command, an analyst notices the following
command:
crypto ipsec transform-set MYSET esp-aes 256 esp-md5-hmac
▪ host 192.168.1.4
▪ range 192.168.1.10 192.168.1.20
▪ host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10
192.168.1.20
▪ host 192.168.1.3
▪ host 192.168.1.3 and host 192.168.1.4
▪ host 192.168.1.4 and range 192.168.1.10 192.168.1.20
Explanation: The show running-config object command is used to display or
verify the IP address/mask pair within the object. There can only be one
statement in the network object. Entering a second IP address/mask pair will
replace the existing configuration.
68. Refer to the exhibit. According to the command output, which three
statements are true about the DHCP options entered on the ASA? (Choose
three.)
▪ DHCP spoofing
▪ DHCP starvation
▪ STP manipulation
▪ MAC and IP address spoofing
Explanation: To protect against MAC and IP address spoofing, apply the IP
Source Guard security feature, using the ip verify source command, on
untrusted ports.
93. What ports can receive forwarded traffic from an isolated port that is
part of a PVLAN?
▪ other isolated ports and community ports
▪ only promiscuous ports
▪ all other ports within the same community
▪ only isolated ports
Explanation: PVLANs are used to provide Layer 2 isolation between ports
within the same broadcast domain. The level of isolation can be specified
with three types of PVLAN ports:
– Promiscuous ports that can forward traffic to all other ports
– Isolated ports that can only forward traffic to promiscuous ports
– Community ports that can forward traffic to other community ports and
promiscuous ports
94. A user complains about being locked out of a device after too many
unsuccessful AAA login attempts. What could be used by the network
administrator to provide a secure authentication access method without
locking a user out of a device?
▪ Use the login delay command for authentication attempts.
▪ Use the login local command for authenticating user access.
▪ Use the aaa local authentication attempts max-fail global configuration
mode command with a higher number of acceptable failures.
▪ Use the none keyword when configuring the authentication method list.
Explanation: The login delay command introduces a delay between failed
login attempts without locking the account. This provides a user with unlimited
attempts at accessing a device without causing the user account to become
locked and thus requiring administrator intervention.
95. What are two drawbacks in assigning user privilege levels on a Cisco
router? (Choose two.)
▪ Only a root user can add or remove commands.
▪ Privilege levels must be set to permit access control to specific device
interfaces, ports, or slots.
▪ Assigning a command with multiple keywords allows access to all
commands using those keywords.
▪ Commands from a lower level are always executable at a higher level.
▪ AAA must be enabled.
Explanation: Privilege levels may not provide desired flexibility and specificity
because higher levels always inherit commands from lower levels, and
commands with multiple keywords give the user access to all commands
available for each keyword. Privilege levels cannot specify access control to
interfaces, ports, or slots. AAA is not required to set privilege levels, but is
required in order to create role-based views. The role of root user does not
exist in privilege levels.
96. Refer to the exhibit. Which conclusion can be made from the show
crypto map command output that is shown on R1?
▪ Traffic from the Internet and DMZ can access the LAN.
▪ Traffic from the Internet and LAN can access the DMZ.
▪ Traffic from the Internet can access both the DMZ and the LAN.
▪ Traffic from the LAN and DMZ can access the Internet.
Explanation: ASA devices have security levels assigned to each interface that
are not part of a configured ACL. These security levels allow traffic from more
secure interfaces, such as security level 100, to access less secure interfaces,
such as level 0. By default, they allow traffic from more secure interfaces
(higher security level) to access less secure interfaces (lower security level).
Traffic from the less secure interfaces is blocked from accessing more secure
interfaces.
105. What network testing tool can be used to identify network layer
protocols running on a host?
▪ SIEM
▪ Nmap
▪ L0phtcrack
▪ Tripwire
106. In the implementation of security on multiple devices, how do ASA
ACLs differ from Cisco IOS ACLs?
▪ Cisco IOS routers utilize both named and numbered ACLs and Cisco
ASA devices utilize only numbered ACLs.
▪ Cisco IOS ACLs are configured with a wildcard mask and Cisco ASA
ACLs are configured with a subnet mask.
▪ Cisco IOS ACLs are processed sequentially from the top down and
Cisco ASA ACLs are not processed sequentially.
▪ Cisco IOS ACLs utilize an implicit deny all and Cisco ASA ACLs end
with an implicit permit all.
Explanation: The Cisco IOS ACLs are configured with a wildcard mask and
the Cisco ASA ACLs are configured with a subnet mask. Both devices use an
implicit deny, top down sequential processing, and named or numbered ACLs.
107. Which statement describes an important characteristic of a site-to-site
VPN?
▪ It must be statically set up.
▪ It is ideally suited for use by mobile workers.
▪ It requires using a VPN client on the host PC.
▪ After the initial connection is established, it can dynamically change
connection information.
▪ It is commonly implemented over dialup and cable modem networks.
Explanation: A site-to-site VPN is created between the network devices of two
separate networks. The VPN is static and stays established. The internal hosts
of the two networks have no knowledge of the VPN.
108. Which two options are security best practices that help mitigate BYOD
risks? (Choose two.)
▪ Use paint that reflects wireless signals and glass that prevents the
signals from going outside the building.
▪ Keep the device OS and software updated.
▪ Only allow devices that have been approved by the corporate IT team.
▪ Only turn on Wi-Fi when using the wireless network.
▪ Decrease the wireless antenna gain level.
▪ Use wireless MAC address filtering.
Explanation: Many companies now support employees and visitors attaching
and using wireless devices that connect to and use the corporate wireless
network. This practice is known as a bring-your-own-device policy or BYOD.
Commonly, BYOD security practices are included in the security policy. Some
best practices that mitigate BYOD risks include the following:
Use unique passwords for each device and account.
Turn off Wi-Fi and Bluetooth connectivity when not being used. Only connect
to trusted networks.
Keep the device OS and other software updated.
Backup any data stored on the device.
Subscribe to a device locator service with a remote wipe feature.
Provide antivirus software for approved BYODs.
Use Mobile Device Management (MDM) software that allows IT teams to track
the device and implement security settings and software controls.
109. Refer to the exhibit. A network administrator configures AAA
authentication on R1. Which statement describes the effect of the keyword
single-connection in the configuration?
▪ The firewall will automatically drop all HTTP, HTTPS, and FTP traffic.
▪ The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
s0/0/0 to g0/0 and will track the connections. Tracking the connection
allows only return traffic to be permitted through the firewall in the
opposite direction.
▪ The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
s0/0/0 to g0/0, but will not track the state of connections. A
corresponding policy must be applied to allow return traffic to be
permitted through the firewall in the opposite direction.
▪ The firewall will automatically allow HTTP, HTTPS, and FTP traffic
from g0/0 to s0/0/0 and will track the connections. Tracking the
connection allows only
▪ return traffic to be permitted through the firewall in the opposite
direction.
▪ The firewall will automatically allow HTTP, HTTPS, and FTP traffic from
g0/0 to s0/0/0, but will not track the state of connections. A
corresponding policy must be applied to allow return traffic to be
permitted through the firewall in the opposite direction.
117. Which privilege level has the most access to the Cisco IOS?
▪ level 0
▪ level 15
▪ level 7
▪ level 16
▪ level 1
118. Refer to the exhibit. A network administrator has configured NAT on
an ASA device. What type of NAT is used?
▪ inside NAT
▪ static NAT
▪ bidirectionalNAT
▪ outside NAT
Explanation: NAT can be deployed on an ASA using one of these methods:
inside NAT – when a host from a higher-security interface has traffic destined
for a lower-security interface and the ASA translates the internal host address
to a global address
outside NAT – when traffic from a lower-security interface destined for a host
on the higher-security interface is translated
bidirectional NAT – when both inside NAT and outside NAT are used together
Because the nat command is applied so that the inside interface is mapped to
the outside interface, the NAT type is inside. Also, the dynamic keyword in the
nat command indicates that it is a dynamic mapping.
119. A network analyst is configuring a site-to-site IPsec VPN. The analyst
has configured both the ISAKMP and IPsec policies. What is the next step?
▪ Configure the hash as SHA and the authentication as pre-shared.
▪ Apply the crypto map to the appropriate outbound interfaces.
▪ Issue the show crypto ipsec sa command to verify the tunnel.
▪ Verify that the security feature is enabled in the IOS.
120. When an inbound Internet-traffic ACL is being implemented, what
should be included to prevent the spoofing of internal networks?
▪ ACEs to prevent traffic from private address spaces
▪ ACEs to prevent broadcast address traffic
▪ ACEs to prevent ICMP traffic
▪ ACEs to prevent HTTP traffic
▪ ACEs to prevent SNMP traffic
Explanation: Common ACEs to assist with antispoofing include blocking
packets that have a source address in the 127.0.0.0/8 range, any private
address, or any multicast addresses. Furthermore, the administrator should
not allow any outbound packets with a source address other than a valid
address that is used in the internal networks of the organization.
121. Match the security term to the appropriate description. (Not all options
are used.)
Match the security term to the appropriate description
122. Which two types of attacks are examples of reconnaissance attacks?
(Choose two.)
▪ brute force
▪ port scan
▪ ping sweep
▪ man-in-the-middle
▪ SYN flood
Explanation: Reconnaissance attacks attempt to gather information about the
targets. Ping sweeps will indicate which hosts are up and responding to pings,
whereas port scans will indicate on which TCP and UDP ports the target is
listening for incoming connections. Man-in-the-middle and brute force attacks
are both examples of access attacks, and a SYN flood is an example of a
denial of service (DoS) attack.
123. Which Cisco solution helps prevent ARP spoofing and ARP poisoning
attacks?
▪ Dynamic ARP Inspection
▪ IP Source Guard
▪ DHCP Snooping
▪ Port Security
124. When the Cisco NAC appliance evaluates an incoming connection from
a remote device against the defined network policies, what feature is being
used?
▪ posture assessment
▪ remediation of noncompliant systems
▪ authentication and authorization
▪ quarantining of noncompliant systems
125. Which two steps are required before SSH can be enabled on a Cisco
router? (Choose two.)
▪ Give the router a host name and domain name.
▪ Create a banner that will be displayed to users when they connect.
▪ Generate a set of secret keys to be used for encryption and decryption.
▪ Set up an authentication server to handle incoming connection requests.
▪ Enable SSH on the physical interfaces where the incoming connection
requests will be received.
Explanation: There are four steps to configure SSH on a Cisco router. First,
set the host name and domain name. Second, generate a set of RSA keys to
be used for encrypting and decrypting the traffic. Third, create the user IDs
and passwords of the users who will be connecting. Lastly, enable SSH on the
vty lines on the router. SSH does not need to be set up on any physical
interfaces, nor does an external authentication server need to be used. While it
is a good idea to configure a banner to display legal information for connecting
users, it is not required to enable SSH.
126. The network administrator for an e-commerce website requires a
service that prevents customers from claiming that legitimate orders are
fake. What service provides this type of guarantee?
▪ confidentiality
▪ authentication
▪ integrity
▪ nonrepudiation
127. Match the security technology with the description.
▪ SHA
▪ RSA
▪ Diffie-Hellman
▪ AES
Explanation: The IPsec framework uses various protocols and algorithms to
provide data confidentiality, data integrity, authentication, and secure key
exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a
public key exchange method and allows two IPsec peers to establish a shared
secret key over an insecure channel.
134. Which two statements describe the use of asymmetric algorithms?
(Choose two.)
▪ Public and private keys may be used interchangeably.
▪ If a public key is used to encrypt the data, a public key must be used to
decrypt the data.
▪ If a private key is used to encrypt the data, a public key must be used to
decrypt the data.
▪ If a public key is used to encrypt the data, a private key must be used to
decrypt the data.
▪ If a private key is used to encrypt the data, a private key must be used
to decrypt the data.
Explanation: Asymmetric algorithms use two keys: a public key and a private
key. Both keys are capable of the encryption process, but the complementary
matched key is required for decryption. If a public key encrypts the data, the
matching private key decrypts the data. The opposite is also true. If a private
key encrypts the data, the corresponding public key decrypts the data.
135. Which statement is a feature of HMAC?
▪ HMAC uses a secret key that is only known to the sender and defeats
man-in-the-middle attacks.
▪ HMAC uses protocols such as SSL or TLS to provide session layer
confidentiality.
▪ HMAC uses a secret key as input to the hash function, adding
authentication to integrity assurance.
▪ HMAC is based on the RSA hash function.
Explanation: A keyed-hash message authentication code (HMAC or KHMAC)
is a type of message authentication code (MAC). HMACs use an additional
secret key as input to the hash function, adding authentication to data integrity
assurance.
136. What is the purpose of the webtype ACLs in an ASA?
▪ to inspect outbound traffic headed towards certain web sites
▪ to restrict traffic that is destined to an ASDM
▪ to monitor return traffic that is in response to web server requests that
are initiated from the inside interface
▪ to filter traffic for clientless SSL VPN users
Explanation: The webtype ACLs are used in a configuration that supports
filtering for clientless SSL VPN users.
137. Which two statements describe the effect of the access control list
wildcard mask 0.0.0.15? (Choose two.)
▪ The first 28 bits of a supplied IP address will be matched.
▪ The last four bits of a supplied IP address will be matched.
▪ The first 28 bits of a supplied IP address will be ignored.
▪ The last four bits of a supplied IP address will be ignored.
▪ The last five bits of a supplied IP address will be ignored.
▪ The first 32 bits of a supplied IP address will be matched.
Explanation: A wildcard mask uses 0s to indicate that bits must match. 0s in
the first three octets represent 24 bits and four more zeros in the last octet,
represent a total of 28 bits that must match. The four 1s represented by the
decimal value of 15 represents the four bits to ignore.
138. Which type of firewall is the most common and allows or blocks traffic
based on Layer 3, Layer 4, and Layer 5 information?
▪ stateless firewall
▪ packet filtering firewall
▪ next generation firewall
▪ stateful firewall
139. Which protocol or measure should be used to mitigate the
vulnerability of using FTP to transfer documents between a teleworker and
the company file server?
▪ SCP
▪ TFTP
▪ ACLs on the file server
▪ out-of-band communication channel
Explanation: File transfer using FTP is transmitted in plain text. The username
and password would be easily captured if the data transmission is intercepted.
Secure Copy Protocol (SCP) conducts the authentication and file transfer
under SSH, thus the communication is encrypted. Like FTP, TFTP transfers
files unencrypted. ACLs provide network traffic filtering but not encryption.
Using an out-of-band communication channel (OOB) either requires physical
access to the file server or, if done through the internet, does not necessarily
encrypt the communication.
140. Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on
the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets
from the ISP will be dropped by the ACL on R1?
any
$HTTP_PORTS
$HOME_NET
tcp
147. Match each SNMP operation to the corresponding description. (Not all
options are used.)