How is management traffic isolated on a Cisco ASR 1002?

How is management traffic isolated on a Cisco ASR 1002? Question: How is management traffic isolated on a Cisco ASR 1002? Options: Traffic is isolated based upon how you configure routing on the device Traffic isolation is done on the VLAN level There is no management traffic isolation on a Cisco ASR 1002 The management … Read more

Which type of attack can exploit design flaws in the implementation of an application without going noticed?

Which type of attack can exploit design flaws in the implementation of an application without going noticed? Question: Which type of attack can exploit design flaws in the implementation of an application without going noticed? Options: volume-based DDoS attacks DHCP starvation attacks low-rate DoS attacks application DDoS flood attacks Correct Answer The Correct Answer for … Read more

Which statement about Cisco ACS authentication and authorization is true?

Which statement about Cisco ACS authentication and authorization is true?The ACS console server provides the scalability, reliability and security a company requires to control and manage servers and other networked devices.Reference: http://www.uk.insight.com/content/dam/insight/EMEA/uk/shop/emerson/advanced-console-server.pdf (page 2) Question: Which statement about Cisco ACS authentication and authorization is true? Options: ACS servers can be clustered to provide scalability. ACS … Read more

Which feature filters CoPP packets?

Which feature filters CoPP packets?Access control lists (ACLs) cannot be applied directly to the control plane subinterfaces. Instead, ACLs are used within the MQC policies (that is, class maps) and the service policy is then applied to the individual control plane subinterfaces.Reference: http://www.cisco.com/c/en/us/about/security-center/understanding-cppr.html Question: Which feature filters CoPP packets? Options: access control lists class maps … Read more

Which wildcard mask is associated with a subnet mask of /27?

Which wildcard mask is associated with a subnet mask of /27?On Cisco router, wildcard subnet mask is used in the following occasion* Defining subnet in ACL* Defining subnet member in OSPF areaReference: http://www.dslreports.com/faq/15216 Question: Which wildcard mask is associated with a subnet mask of /27? Options: 0.0.0.31 0.0.027 0.0.0.224 0.0.0.255 Correct Answer The Correct Answer … Read more

Which command do you enter to verify the status and settings of an IKE Phase 1 tunnel?

Which command do you enter to verify the status and settings of an IKE Phase 1 tunnel? Question: Which command do you enter to verify the status and settings of an IKE Phase 1 tunnel? Options: show crypto isakmp sa show crypto ipsec transform-set show crypto ipsec as output show crypto isakmp policy Correct Answer … Read more

When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?

When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?This action prevents the attacker from communicating with the victim on any port. However, the attacker could communicate with other hosts, making this action better suited for exploits that target a specific host. This event action is appropriate … Read more

What is a possible result of this activity?

An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?The BPDU guard feature is designed to allow network designers to keep the active network topology predictable. BPDU guard is used to protect the switched network from the problems that may be caused by the … Read more

Which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?

In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon? Question: Which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon? Options: phishing pharming solicitation secure transaction Correct Answer The Correct Answer … Read more