1.5 Flashcards
1
Q
- On what switch ports should BPDU guard be enabled to enhance STP stability?
only ports that attach to a neighboring switch
all PortFast-enabled ports Correct
all trunk ports that are not root ports
only ports that are elected as designated ports
A
all PortFast-enabled ports Correct
2
Q
82. Which feature is specific to the Security Plus upgrade license of an ASA 5505 and provides increased availability? redundant ISP connections routed mode transparent mode stateful packet inspection
A
redundant ISP connections
3
Q
83. A company deploys a hub-and-spoke VPN topology where the security appliance is the hub and the remote VPN networks are the spokes. Which VPN method should be used in order for one spoke to communicate with another spoke through the single public interface of the security appliance? split tunneling MPLS GRE Hairpinning
A
Hairpinning
4
Q
- What are two drawbacks in assigning user privilege levels on a Cisco router? (Choose two.)
Privilege levels must be set to permit access control to specific device interfaces, ports, or slots.
Assigning a command with multiple keywords allows access to all commands using those keywords.
Only a root user can add or remove commands.
Commands from a lower level are always executable at a higher level.
AAA must be enabled.
A
Assigning a command with multiple keywords allows access to all commands using those keywords.
Commands from a lower level are always executable at a higher level.
5
Q
85. Which two types of hackers are typically classified as grey hat hackers? (Choose two.) script kiddies vulnerability brokers cyber criminals state-sponsored hackers hacktivists
A
vulnerability brokers
hacktivists
6
Q
86. What is the default preconfigured interface for the outside network on a Cisco ASA 5505? VLAN 2 Ethernet 0/2 Ethernet 0/1 VLAN 1
A
VLAN 2
7
Q
87. A user successfully logs in to a corporate network via a VPN connection. Which part of the AAA process records that a certain user performed a specific operation at a particular date and time? authentication accounting access authorization
A
accounting
8
Q
88. What determines which switch becomes the STP root bridge for a given VLAN? the lowest bridge ID the highest MAC address the highest priority the lowest IP address
A
lowest
9
Q
- What is a function of the GRE protocol?
to configure the set of encryption and hashing algorithms that will be used to transform the data sent through the IPsec tunnel
to provide encryption through the IPsec tunnel
to configure the IPsec tunnel lifetime
to encapsulate multiple OSI Layer 3 protocol packet types inside an IP tunnel
A
to encapsulate multiple OSI Layer 3 protocol packet types inside an IP tunnel
10
Q
- What is used to determine the root bridge when the priority of the switches are the same?
the MAC address with the highest hexadecimal value
the lowest ip address
the layer 2 address with the lowest hexadecimal value
the highest BID
A
the layer 2 address with the lowest hexadecimal value
11
Q
- What is algorithm-type to protect the data in transit?
A
Hashing algorithm
12
Q
92. What type of ACL is designed for use in the configuration of an ASA to support filtering for clientless SSL VPN’s? Webtype Standard Ethertype Extended
A
Webtype
13
Q
- The following authentication configuration is applied to a router.
aaa authentication login default tacacs+ local enable none
Several days later the TACACS+ server goes off-line. Which method will be used to authenticate users?
none
manually configured vty line password
local username/password database
default
A
none
14
Q
- A security technician is evaluating a new operations security proposal designed to limit access to all servers. What is an advantage of using network security testing to evaluate the new proposal?
Network security testing proactively evaluates the effectiveness of the proposal before any real threat occurs.
Network security testing is most effective when deploying new security proposals.
Network security testing is specifically designed to evaluate administrative tasks involving server and workstation access.
Network security testing is simple because it requires just one test to evaluate the new proposal.
A
Network security testing proactively evaluates the effectiveness of the proposal before any real threat occurs.