1.4 Flashcards
61. What function is provided by the Tripwire network security tool? password recovery security policy compliance IDS signature development logging of security events
policy
62. What is the function of a policy map configuration when an ASA firewall is being configured? binding class maps with actions identifying interesting traffic binding a service policy to an interface using ACLs to match traffic
binding class maps with actions
63. If a network administrator wants to track the usage of FTP services, which keyword or keywords should be added to the aaa accounting command? exec default connection exec network
exec
What is indicated by the use of the local-case keyword in a local AAA authentication configuration command sequence?
That AAA is enabled globally on the router.
That passwords and usernames are case-sensitive.
That a default local database AAA authentication is applied to all lines.
That user access is limited to vty terminal lines.
That passwords and usernames are case-sensitive.
- What is the purpose of a local username database if multiple ACS servers are configured to provide authentication services?
Clients using internet services are authenticated by ACS servers, whereas local clients are authenticated through a local username database.
Each ACS server must be configured with a local username database in order to provide authentication services.
A local username database is required when creating a method list for the default login.
A local username database provides redundancy if ACS servers become unreachable.
unreachable
Refer to the exhibit. Based on the security levels of the interfaces on ASA1, what traffic will be allowed on the interfaces?
Traffic from the Internet and LAN can access the DMZ.
Traffic from the Internet and DMZ can access the LAN.
Traffic from the Internet can access both the DMZ and the LAN.
Traffic from the LAN and DMZ can access the Internet.
Traffic from the LAN and DMZ can access the Internet.
- What are two reasons to enable OSPF routing protocol authentication on a network? (Choose two.)
to ensure more efficient routing
to prevent data traffic from being redirected and then discarded
to ensure faster network convergence
to prevent redirection of data traffic to an insecure link
to provide data security through encryption
to prevent data traffic from being redirected and then discarded
to prevent redirection of data traffic to an insecure link
- A security awareness session is best suited for which topic?
required steps when reporting a breach of security
the primary purpose and use of password policies
steps used to configure automatic Windows updates
how to install and maintain virus protection
when
69. What provides both secure segmentation and threat defense in a Secure Data Center solution? Cisco Security Manager software AAA server Adaptive Security Appliance intrusion prevention system
Adaptive Security Appliance
70. Which two features should be configured on end-user ports in order to prevent STP manipulation attacks? ( Choose two.) root guard UDLD BPDU guard loop guard PortFast
BPDU guard
PortFast
- What is a characteristic of most modern viruses?
They are usually found attached to online games.
Email viruses are the most common type of them.
They replicate themselves and locate new targets.
They are responsible for some of the most destructive internet attacks.
Email viruses are the most common type of them.
- Which statement describes a characteristic of the Security Device Event Exchange (SDEE) feature supported by the Cisco IOS IPS?
SDEE notification is disabled by default. It does not receive and process events from the Cisco IOS IPS unless SDEE notification is enabled.
SDEE notification is enabled by default. It receives and processes events from the Cisco IOS IPS and sends them to a syslog server.
SDEE notification is enabled by default. It receives and processes events from the Cisco IOS IPS and stores them in a buffer.
SDEE notification is disabled by default. It starts receiving and processing events from the Cisco IOS IPS as soon as an attack signature is detected.
SDEE notification is disabled by default. It does not receive and process events from the Cisco IOS IPS unless SDEE notification is enabled.
73. Which network security tool allows an administrator to test and detect weak passwords? L0phtcrack Tripwire Nessus Metasploit
L0phtcrack
- What is an advantage of logging packets that are seen by an IPS device?
Packets from the IP address that triggered the logging are denied once logging begins.
Administrators can decide what actions can be taken in the future.
Administrators can use the brief summary that is generated to quickly determine how to handle the packets.
Attacker packets can be stopped immediately.
Administrators can decide what actions can be taken in the future.
75. Which procedure is recommended to mitigate the chances of ARP spoofing? Enable DHCP snooping on selected VLANs. Enable IP Source Guard on trusted ports. Enable DAI on the management VLAN. Enable port security globally.
DAI