1.
Which of the following statements are true regarding TACACS+? (Select 2 choices.)
2.
Which of the following protocols can IPSec use to provide the integrity component of the CIA triad? (Select 2 choices.)
3.
RouterA is configured to establish an IKE tunnel with RouterB. You issue the show crypto isakmp sa command on RouterA and receive the following output:
dst src state connid slot
10.1.2.3 10.1.2.4 MM_SA_SETUP 1 0
Which of the following statements is true? (Select the best answer.)
4.
Which of the following worms was used in an act of cyber warfare against Iranian ICSs? (Select the best answer.)
5.
Which of the following statements is true regarding the Cisco IOS Resilient Configuration feature? (Select the best answer.)
6.
Which of the following can be installed on a host to analyze and prevent malicious traffic on that host? (Select the best answer.)
7.
Which of the following traffic types can be detected by the FirePOWER ratebased prevention preprocessor engine? (Select the best answer.)
8.
Which of the following commands should you issue to allow a packet to exit an ASA through the same interface through which it entered the ASA? (Select the best answer.)
9.
Which of the following devices requires that a physical interface be in promiscuous mode in order to monitor network traffic? (Select the best answer.)
10.
Which of the following is typically implemented in a cluster configuration? (Select the best answer.)