What does the Common Criteria (CC) standard define?

Correct Answer for the Question – What does the Common Criteria (CC) standard define? is given below What does the Common Criteria (CC) standard define? The current list of Common Vulnerabilities and Exposures (CVEs) The U.S standards for encryption export regulations Tools to support the development of pivotal, forward-looking information system technologies The international standards for … Read more

Which ICMP message could be used with traceroute to map network topology?

Correct Answer for the Question – Which ICMP message could be used with traceroute to map network topology? is given below Which ICMP message could be used with traceroute to map network topology? Echo Reply Redirect Time Exceeded Echo Router Selection Address Mask Request Correct Answer The Correct Answer for this Question is Time Exceeded The … Read more

Which two statements about OSPF authentication are true?

Correct Answer for the Question – Which two statements about OSPF authentication are true? is given below Which two statements about OSPF authentication are true? (Choose two.) OSPF authentication is required in area 0. There are three types of OSPF authentication. In MD5 authentication, the password is encrypted when it is sent. Null authentication includes the … Read more

Which three HTTP header fields can be classified by NBAR for request messages?

Correct Answer for the Question – Which three HTTP header fields can be classified by NBAR for request messages? is given below Which three HTTP header fields can be classified by NBAR for request messages? (Choose three.) User-Agent Server Referrer Content-Encoding Location From Correct Answer The Correct Answer for this Question is User-Agent Referrer From The … Read more

Which three statements are true about MACsec?

Correct Answer for the Question – Which three statements are true about MACsec? is given below Which three statements are true about MACsec? (Choose three.) It supports GCM modes of AES and 3DES. It is defined under IEEE 802.1AE. It provides hop-by-hop encryption at Layer 2. MACsec expects a strict order of frames to prevent anti-replay. … Read more

Which three IP resources is the IANA responsible?

Correct Answer for the Question – Which three IP resources is the IANA responsible? is given below Which three IP resources is the IANA responsible? (Choose three.) IP address allocation detection of spoofed address criminal prosecution of hackers autonomous system number allocation root zone management in DNS BGP protocol vulnerabilities Correct Answer The Correct Answer for … Read more

What are the three benefits of SSL offload?

Correct Answer for the Question – What are the three benefits of SSL offload? is given below What are the three benefits of SSL offload? (Choose three.) Total offload of encryption from the servers Partial offload of encryption from the servers Layer 5 to 7 awareness for Layer 7 switching Layer 5 to 7 awareness for … Read more

Which two statements describe GRE?

Correct Answer for the Question – Which two statements describe GRE? is given below Which two statements describe GRE? (Choose two.) GRE acts as passenger protocol for a Layer 3 transport protocol. GRE acts as a tunneling protocol and encapsulates other protocols. GRE provides data confidentiality. Packet MTU must be adjusted to accommodate GRE overhead. GRE … Read more

Where should the iACL be applied?

Correct Answer for the Question – Where should the iACL be applied? is given below When configuring an Infrastructure ACL (iACL) to protect the IPv6 infrastructure of an enterprise network, where should the iACL be applied?? all infrastructure devices in both the inbound and outbound direction all infrastructure devices in the inbound direction all infrastructure devices … Read more

Which two answers describe provisions of the SOX Act and its international counterpart Acts?

Correct Answer for the Question – Which two answers describe provisions of the SOX Act and its international counterpart Acts? is given below Which two answers describe provisions of the SOX Act and its international counterpart Acts? (Choose two.) confidentiality and integrity of customer records and credit card information accountability in the event of corporate fraud … Read more