1.
Which characteristic is a potential security weakness of a traditional stateful firewall?

 
2.
What will be disabled as a result of the no service password-recovery command?
3.
What does the MD5 algorithm do?
4.
You have configured a standard access control list on a router and applied it to interface Serial 0 in an outbound direction. No ACL is applied to Interface Serial 1 on the same router. What happens when traffic being filtered by the access list does not match the configured ACL statements for Serial 0?
5.
Which consideration is important when implementing Syslogging in your network?
6.
Which statement is true when you have generated RSA keys on your Cisco router to prepare for secure device management?
7.
For the following attempts, which one is to ensure that no one employee becomes a pervasive security threat, that data can be recovered from backups, and that information system changes do not compromise a system's security?
8.
In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data?
9.
What Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX?
10.
Information about a managed device??s resources and activity is defined by a series of objects. What defines the structure of these management objects?