1.
Refer to the following partial sample output from the show crypto ipsec sa command:
PFS (Y/N): N, DH group: none
0x82E64150(2196128080)
FastEthernet0/0 current outbound spi:
10.20.20.2 path mtu 1500, ip mtu 1500, ip mtu idb
local crypto endpt.: 10.10.10.2, remote crypto endpt.:
#send errors 0, #recv errors 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts decaps: 2, #pkts decrypt: 2, #pkts verify: 2
#pkts encaps: 2, #pkts encrypt: 2, #pkts digest: 2
PERMIT, flags={origin_is_acl,}
current_peer 10.20.20.2 port 500
(addr/mask/prot/port): (172.16.17.0/255.255.255.0/0/0)
(192.168.1.0/255.255.255.0/0/0) remote ident
local ident (addr/mask/prot/port):
protected vrf: (none)
Crypto map tag: aesmap, local addr 10.10.10.2
interface: FastEthernet0/0
Which of the following statements is true? (Select the best answer.)
2.
Which of the following statements is true regarding a HIDS? (Select the best answer.)
3.
Which of the following statements is true regarding OWASP? (Select the best answer.)
4.
Which of the following best describes a MAC spoofing attack? (Select the best answer.)
5.
You issue the show zone security command on a Cisco router and receive the following command output:
RouterA#show zone security
zone self
Description: System defined zone
zone inside
Member Interfaces:
FastEthernet0/0
FastEthernet0/1
zone outside
Member Interfaces:
Serial0/0/0
zone dmz
Member Interfaces:
Serial0/0/1
Based on the command output, to which zones can the S0/1/0 interface send traffic? (Select the best answer.)
6.
Which of the following features can cause a switch port to enter the errdisable state? (Select the best answer.)
7.
Which of the following are not considered NGE cryptographic algorithms and should be avoided according to Cisco? (Select 2 choices.)
8.
You want to configure a router so that networkbased CLI access is limited to SSH connections that are received on a specified interface. Which of the following Cisco IOS features should you configure to achieve your goal? (Select the best answer.)
9.
Which of the following describes a TPM? (Select the best answer.)
10.
Which of the following are not default values in an IKE policy on an ASA running software version 8.4 or higher? (Select 2 choices.)