To view this notification widget you need to have JavaScript enabled. This notification widget was easily created with NotifySnack.
  Loading... Please wait...

(TCO 1) Which attack type is most often associated with the use of social engineering?

Price:
$29.99


Product Description

  1. (TCO 1) Which attack type is most often associated with the use of social engineering?
  2. (TCO 1) The agents used in a distributed denial of service attack are called _____.
  3. (TCO 1) Ping scans and port scans are tools used for an attack method called _____.
  4. (TCO 1) The _____ attack method modifies the IP header to indicate that there are more data than there actual are.
  5. (TCO 1) The component of network security that ensures that data being sent or received cannot be read by unauthorized users is _____.
  6. (TCO 1) The component of network security that ensures that data being sent or received have not been corrupted or modified in transit is _____.
  7. (TCO 1) The type of security control that makes use of security audits and tests is called _____.
  8. (TCO 1) An external menace to a system or its design is called a(n) _____.
  9. (TCO 2) Which of the following prompts indicates that you have booted (normally) into the IOS stored in Flash memory?
  10. (TCO 2) Which of the following configuration register settings will cause the router to bypass the stored configuration settings in NVRAM (used for password recovery)?
  11. (TCO 2) To enter privileged EXEC mode, you can type the command _____ at the user EXEC prompt.
  12. (TCO 2) Which TCP/IP application layer protocol can be used by network administrators to configure a router via a VTY line?
  13.  
    (TCO 2) To configure a Privilege Level 10 enable password, use the command _____.
  14.  
    (TCO 2) Given the Cisco IOS command log in block-for 20 attempts 3 within 30, the number of attempts before blocking user log-in is _____.
  15.  
    (TCO 2) To use the security device manager (SDM) on a Cisco router, which of the following IOS commands is not required?
  16.  
    (TCO 2) Which of the following cannot be used to enhance access security on a router?
  17.  
    (TCO 3) As a best practice for switch security, how should VLAN 1 be used?
  18.  
    (TCO 3) Which of the following is the default violation mode configured when you execute the switchport port-security command on a switch port?
  19.  
    (TCO 3) Which port-security command below is used to capture the current MAC address on an interface?
  20.  
    (TCO 3) Which port-security violation mode requires an administrator to manually reset the port when a violation occurs?
  21.  
    (TCO 3) Which switch feature causes a port to skip the listening and learning states, causing the port to enter the forwarding state very quickly?
  22.  
    (TCO 3) Which of the following switch commands will enable portfast on all ports except for trunk ports?
  23.  
    (TCO 3) One can configure BPDU guard globally on an access port by
  24.  
    Which port security feature of a switch has its only action to drop frames arriving on that port when a violation occurs?
  25.  
    (TCO 4) Which type of access list entry is dynamic and becomes active only when a Telnet session is authenticated? It can be used for inbound or outbound traffic.
  26.  
    (TCO 4) Given the configuration shown below, users in the 192.168.100.0/24 network will be _____.
    access-list 101 permit tcp 192.168.100.0 0.0.0.255 any eq telnet
    access-list 101 permit tcp 192.168.100.0 0.0.0.255 any eq www time-range MWF
    access-list 101 deny tcp 192.168.200.0 0.0.0.255 any eq ftp time-range ABS
    !
    time-range MWF
    periodic Monday Wednesday Friday 8:00 to 17:00
    ! Note the spaces between days and the word to between start and end times
    time-range ABS
    absolute start 00:00 20 September 2012 end 01:00 20 September 2012
  27.  
    (TCO 4) Given the configuration shown below, users in the 192.168.200.0/24 network will be _____.
    access-list 101 permit tcp 192.168.100.0 0.0.0.255 any eq telnet
    access-list 101 permit tcp 192.168.100.0 0.0.0.255 any eq www time-range MWF
    access-list 101 deny tcp 192.168.200.0 0.0.0.255 any eq ftp time-range ABS
    !
    time-range MWF
    periodic Monday Wednesday Friday 8:00 to 17:00
    ! Note the spaces between days and the word to between start and end times
    time-range ABS
    absolute start 00:00 20 September 2008 end 01:00 20 September 2008
  28.  
    (TCO 4) Given the configuration shown below, the host at IP address 192.168.100.100 is a _____.
    ip inspect audit-trail
    ip inspect name FWRULE tcp timeout 180
    ip inspect name FWRULE udp timeout 180
    !
    interface FastEthernet0/0
    ip access-group 100 in
    ip inspect FWRULE in
    !
    interface FastEthernet0/1
    ip access-group 101 in
    !
    logging on
    logging 192.168.100.100
    !
    access-list 100 permit ip any any
    !
    access-list 101 deny ip any any log
  29.  
    (TCO 4) Which of the following is not a policy action that can be specified for zone-based firewall traffic?
  30.  
    (TCO 4) With zone-based firewalls, which of the following is used to define an unidirectional firewall policy between two areas with different security levels?
  31.  
    (TCO 4)  Cisco IronPort Web Security Appliance is an example of which of the following?
  32.  
    (TCO 4) Which programming mechanism is used to provide zone-based firewall services in a Cisco IOS router?
  33.  
    (TCO 5) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If the response is ERROR, this means _____.
  34.  
    (TCO 5) Which of the following is not considered a component of AAA?
  35.  
    (TCO 5) Which AAA server protocol is best suited to produce detailed accounting reports of network activity?
  36.  
    (TCO 5) With what can you configure AAA on the router?
  37.  
    (TCO 5) Which of the following command is used in global configuration mode to enable AAA?
  38.  
    (TCO 5) Which configuration command causes a start-accounting record for a point to point session to be sent to a TACACS+ server?
  39.  
    (TCO 5) Which statement is true for ACS 5.x?
  40.  
    (TCO 5) Which of the following is not supported by Cisco Secure ACS?
  41.  
    (TCO 6) Which of the following commands will delete all of the IOS firewall router’s RSA keys?
  42.  
    (TCO 6) The default lifetime of an ISAKMP security association (SA) is _____.
  43.  
    (TCO 6) The Cisco IOS firewall crypto isakmp policy mode command that will set the isakmp security association lifetime is _____.
  44.  
    (TCO 6) _____ encryption algorithms use the same key to encrypt and decrypt data between the sender and recipient.
  45.  
    (TCO 6) The _____ encryption algorithm uses a key size of 128, 192, and 256 bits.
  46.  
    (TCO 6) Which of the following algorithms is used to send large blocks of data across a VPN tunnel?
  47.  
    (TCO 6) Which of the following commands will delete all of the IOS firewall router’s RSA keys?
  48.  
    (TCO 6) DES operates in the following block cipher mode?
  49.  
    (TCO 7) The type of IDS signature that triggers on a single packet is called _____.
  50.  
    (TCO 7) Which device responds immediately and does not allow malicious traffic to pass?
  51.  
    (TCO 7) When an IDS or IPS fails to report an actual intrusion attempt, this is referred to as a _____.
  52.  
    (TCO 7) When an IDS or IPS accurately reports an intrusion attempt, this is referred to as a _____.
  53.  
    (TCO 7) Which is an IDS or IPS signature?
  54.  
    (TCO 7) Which of the following ip actions will drop the packet and all future packets from this TCP flow?
  55.  
    (TCO 7) The type of intrusion prevention technology that is used by Cisco IOS firewall routers and security appliances is _____.
  56.  
    (TCO 7) Which of the following are not a type of IDS sensor?

Products by Category