1.
Which of the following statements is true regarding a HIDS? (Select the best answer.)
2.
Which of the following statements is true regarding OWASP? (Select the best answer.)
3.
Which of the following best describes a MAC spoofing attack? (Select the best answer.)
4.
You issue the show zone security command on a Cisco router and receive the following command output:
RouterA#show zone security
zone self
Description: System defined zone
zone inside
Member Interfaces:
FastEthernet0/0
FastEthernet0/1
zone outside
Member Interfaces:
Serial0/0/0
zone dmz
Member Interfaces:
Serial0/0/1
Based on the command output, to which zones can the S0/1/0 interface send traffic? (Select the best answer.)
5.
Which of the following features can cause a switch port to enter the errdisable state? (Select the best answer.)
6.
Which of the following are not considered NGE cryptographic algorithms and should be avoided according to Cisco? (Select 2 choices.)
7.
You want to configure a router so that networkbased CLI access is limited to SSH connections that are received on a specified interface. Which of the following Cisco IOS features should you configure to achieve your goal? (Select the best answer.)
8.
Which of the following describes a TPM? (Select the best answer.)
9.
Which of the following are not default values in an IKE policy on an ASA running software version 8.4 or higher? (Select 2 choices.)
10.
Which of the following is specifically filtered by a URL filtering subscription service on a Cisco router? (Select the best answer.)