Sample Questions:
What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)
The Internet Key Exchange protocol establishes security associations
The Internet Key Exchange protocol establishes security associations
The Internet Key Exchange protocol provides replay detection
The Internet Key Exchange protocol is responsible for mutual authentication
What is the Cisco preferred countermeasure to mitigate CAM overflows?
Port security
Dynamic port security
IP source guard
Root guard
Which three statements are characteristics of DHCP Spoofing? (choose three)
Arp Poisoning
Modify Traffic in transit
Used to perform man-in-the-middle attack Physically modify the network gateway
Protect the identity of the attacker by masking the DHCP address
can access most network devices
Which type of security control is defense in depth?
Threat mitigation
Risk analysis
Botnet mitigation
Overt and covert channels
If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two.)
The user will be prompted to authenticate using the enable password
Authentication attempts to the router will be denied
Authentication will use the router`s local database
Authentication attempts will be sent to the TACACS+ server
Which firewall configuration must you perform to allow traffic to flow in both directions between two zones?
You must configure two zone pairs, one for each direction.
You can configure a single zone pair that allows bidirectional traffic flows for any zone.
You can configure a single zone pair that allows bidirectional traffic flows for any zone except the self zone.
You can configure a single zone pair that allows bidirectional traffic flows only if the source zone is the less secure zone.
Which source port does IKE use when NAT has been detected between two VPN gateways?
TCP 4500
TCP 500
UDP 4500
UDP 500
Which three ESP fields can be encrypted during transmission? (Choose three.)
Security Parameter Index
Sequence Number
MAC Address
Padding
Pad Length
Next Header
Which IPS mode provides the maximum number of actions?
inline
promiscuous
span
failover
bypass
Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?
contextual analysis
holistic understanding of threats
graymail management and filtering
signature-based IPS