1.
Which security operations management best practice should be followed to enable appropriate network access for administrators?
2.
An attacker has gained physical access to a password protected router. Which command will prevent access to the startup-config in NVRAM?
3.
Which command tests authentication with SSH and shows a generated key?
4.
Which configuration keyword will configure SNMPv3 with authentication but no encryption?
5.
In IOS routers, what configuration can ensure both prevention of ntp spoofing and accurate time ensured?
6.
Which product can manage licenses, updates, and a single signature policy for 15 separate IPS appliances?
7.
When you set a Cisco IOS Router as an SSH server, which command specifies the RSA public key of the remote peer when you set the SSH server to perform RSA-based authentication?
8.
Enabling what security mechanism can prevent an attacker from gaining network topology information from CDP via a man-in-the-middle attack?
9.
On an ASA running version 9.0, which command is used to nest objects in a pre-existing group?
10.
Which ASA feature is used to keep track of suspected attackers who create connections to too many hosts or ports?