1.
When a company puts a security policy in place, what is the effect on the company's business?
2.
Which IOS feature can limit SSH access to a specific subnet under a VTY line?
3.
Which command configures logging on a Cisco ASA firewall to include the date and time?
4.
What must be configured before Secure Copy can be enabled?
5.
Which command configures stateful packet inspection to inspect a packet after it passes the inbound ACL of the input interface?
6.
Which statement about identity NAT is true?
7.
Which element must you configure to allow traffic to flow from one security zone to another?
8.
Which technology is the most effective choice for locally mirroring ports to support data investigation for a single device at the data layer?
9.
Which monitoring protocol uses TCP port 1470 or UDP port 514?
10.
Which option provides the most secure method to deliver alerts on an IPS?