1.
When port security is enabled on a Cisco Catalyst switch, what is the default action when the configured maximum number of allowed MAC addresses value is exceeded?
2.
You use Cisco Configuration Professional to enable Cisco IOS IPS. Which state must a signature be in before any actions can be taken when an attack matches that signature?
3.
Which statement describes how the sender of the message is verified when asymmetric encryption is used?
4.
Which type of security control is defense in depth?
5.
Which option is a characteristic of the RADIUS protocol?
6.
When STP mitigation features are configured, where should the root guard feature be deployed?
7.
Which option is a characteristic of a stateful firewall?
8.
Which type of NAT would you configure if a host on the external network required access to an internal host?
9.
Which option is a feature of Cisco ScanSafe technology?
10.
Under which higher-level policy is a VPN security policy categorized?