Which actions can a promiscuous IPS take to mitigate an attack?

Correct Answer for the Question – Which actions can a promiscuous IPS take to mitigate an attack? is given below Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)Answer: B,D,E Modifying packets Requesting connection blocking Denying packets Resetting the TCP connection Requesting host blocking Denying frames Correct Answer The Correct Answer for … Read more

Which of the following statements about access lists are true?

Correct Answer for the Question – Which of the following statements about access lists are true? is given below Which of the following statements about access lists are true? (Choose three.)Answer: B,C,E Extended access lists should be placed as near as possible to the destination Extended access lists should be placed as near as possible to … Read more

Unicast Reverse Path Forwarding definition:

Correct Answer for the Question – Unicast Reverse Path Forwarding definition: is given below Unicast Reverse Path Forwarding definition:Unicast Reverse Path ForwardingUnicast Reverse Path Forwarding (uRPF) can mitigate spoofed IP packets. When this feature is enabled on an interface, as packets enter that interface the router spends an extra moment considering the source address of the … Read more

What causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network.

Correct Answer for the Question – What causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network. is given below What causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network. Client entered wrong credentials multiple times. Client entered wrong credentials First … Read more

Man-in-the-middle attack definition:

Correct Answer for the Question – Man-in-the-middle attack definition: is given below Man-in-the-middle attack definition:Man-in-the-middle attacks: Someone or something is between the two devices who believe they are communicating directly with each other. The “man in the middle” may be eavesdropping or actively changing the data that is being sent between the two parties. You can … Read more

Which Layer Data Center Operate

Correct Answer for the Question – Which Layer Data Center Operate is given below At which Layer Data Center OperateLink: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCInfra_2.html Data Center Other option Correct Answer The Correct Answer for this Question is Data Center Explanation The Question – Which Layer Data Center Operate has been answered correctly and answer for the question is Data … Read more

How can you stop reconnaissance attack with cdp?

Correct Answer for the Question – How can you stop reconnaissance attack with cdp? is given below How can you stop reconnaissance attack with cdp? Disable CDP on edge ports (computers) Other option Correct Answer The Correct Answer for this Question is Disable CDP on edge ports (computers) Explanation The Question – How can you stop … Read more

Why IPsec tunnel is not working.?

Correct Answer for the Question – Why IPsec tunnel is not working.? is given below Why IPsec tunnel is not working.? Because the ASA can’t receive packets from remote endpoint Other option Correct Answer The Correct Answer for this Question is Because the ASA can’t receive packets from remote endpoint Explanation The Question – Why IPsec … Read more

Which of the Diffie-Hellman group are support by cisco VPN Product?

Correct Answer for the Question – Which of the Diffie-Hellman group are support by cisco VPN Product? is given below Which of the Diffie-Hellman group are support by cisco VPN Product? (Choose all that apply) Group1 Group2 Group3 Group5 Group7 Group8 Group9 Correct Answer The Correct Answer for this Question is Group1 Group2 Group5 Group7 The … Read more