1.
Which statement about asymmetric encryption algorithms is true?
2.
Which option can be used to authenticate the IPsec peers during IKE Phase 1?
3.
Which single Cisco IOS ACL entry permits IP addresses from 172.16.80.0 to 172.16.87.255?
4.
You want to use the Cisco Configuration Professional site-to-site VPN wizard to implement a site- to-site IPsec VPN using pre-shared key. Which four configurations are required (with no defaults)? (Choose four.)
5.
Which option represents a step that should be taken when a security policy is developed?
6.
Which type of network masking is used when Cisco IOS access control lists are configured?
7.
How are Cisco IOS access control lists processed?
8.
Which type of management reporting is defined by separating management traffic from production traffic?
9.
Which syslog level is associated with LOG_WARNING?
10.
In which type of Layer 2 attack does an attacker broadcast BDPUs with a lower switch priority?