Home
66.
Which of the following steps should be performed first when troubleshooting a secured network environment? (Choose the best answer.)
  • A.
    Disable the network security features to eliminate them as potential sources of the reported issue.
  • B.
    Begin your troubleshooting at Layer 1, and work your way up to the levels where the security features reside.
  • C.
    Determine whether the reported behavior is actually appropriate behavior, based on the network's security policy
  • D.
    Begin your troubleshooting at Layer 7, and work your way down to the levels where the security features reside.
  • Answer
  • Report
Answer : [C]
Report
Name Email  
67.
What Cisco IOS feature, available on some router platforms, can recognize the signature of well-known attacks, and prevent traffic from those attacks from entering the network?
  • A.
    VPN
  • B.
    IPS
  • C.
    Cisco IOS Firewall
  • D.
    ACL
  • Answer
  • Report
Answer : [B]
Report
Name Email  
68.
Identify two Cisco Catalyst switch features that can mitigate the introduction of a rogue switch into a network by an attacker, where the attacker attempts to make the newly added rogue switch become the root bridge for the topology. (Choose the two best answers.)
  • A.
    Root Guard
  • B.
    Backbone Fast
  • C.
    Uplink Fast
  • D.
    BPDU Guard
  • Answer
  • Report
Answer : [A, D]
Report
Name Email  
69.
What alternative to Telnet provides secure access to a router's command-line interface? (Choose the best answer.)
  • A.
    TACAC S+
  • B.
    SSL
  • C.
    HTTPS
  • D.
    SSH
  • Answer
  • Report
Answer : [D]
Report
Name Email  
70.
What command can you use to prevent an attacker from performing password recovery on some platforms?
  • A.
    config-reg 0x2124
  • B.
    service password-encryption
  • C.
    no service password-recovery
  • D.
    enable secret 5
  • Answer
  • Report
Answer : [C]
Report
Name Email