Match the network security testing tool with the correct function. (Not all options are used.)
Continue reading…
Uncategorized
What three tasks can a network administrator accomplish with the Nmap and Zenmap security testing tools? (Choose three.)
What three tasks can a network administrator accomplish with the Nmap and Zenmap security testing tools? (Choose three.) operating system fingerprinting assessment of Layer 3 protocol support on hosts open UDP and TCP port detection security event analysis and reporting password recovery development of IDS signatures Answers Explanation & Hints: Nmap is a low-level network […]
Continue reading…
What type of network security test uses simulated attacks to determine the feasibility of an attack as well as the possible consequences if the attack occurs?
What type of network security test uses simulated attacks to determine the feasibility of an attack as well as the possible consequences if the attack occurs? penetration testing network scanning integrity checking vulnerability scanning Answers Explanation & Hints: There are many tests that are used by security specialists to assess the status of a system. […]
Continue reading…
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next?
Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next? nat (inside,outside) dynamic NET1 nat (outside,inside) dynamic NET1 nat (inside,outside) dynamic interface nat (outside,inside) dynamic interface Answers Explanation & Hints: The nat (inside,outside) dynamic interface command […]
Continue reading…
In the implementation of network security, how does the deployment of a Cisco ASA firewall differ from a Cisco IOS router?
In the implementation of network security, how does the deployment of a Cisco ASA firewall differ from a Cisco IOS router? ASA devices use ACLs that are always numbered. ASA devices do not support an implicit deny within ACLs. ASA devices support interface security levels. ASA devices use ACLs configured with a wildcard mask. Answers […]
Continue reading…
Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group name SERVICE1 ?
Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group name SERVICE1 ? ip tcp udp icmp Answers Explanation & Hints: Because this is a service object group, the keyword should indicate which protocol is used. The options are […]
Continue reading…
Refer to the exhibit. A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces?
Refer to the exhibit. A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces? Outside 0, Inside 35, DMZ 90 Outside 40, Inside 100, DMZ 0 Outside 0, Inside 100, DMZ 50 Outside 100, Inside 10, DMZ 40 Answers Explanation […]
Continue reading…
Which special hardware module, when integrated into ASA, provides advanced IPS features?
Which special hardware module, when integrated into ASA, provides advanced IPS features? Content Security and Control (CSC) Advanced Inspection and Prevention (AIP) Advanced Inspection and Prevention Security Services Card (AIP-SSC) Advanced Inspection and Prevention Security Services Module (AIP-SSM) Answers Explanation & Hints: The advanced threat control and containment services of an ASA firewall are provided […]
Continue reading…
Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C?
Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C? A – […]
Continue reading…
What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?
What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites? By applying the ACL on a public interface, multiple crypto ACLs can be built to prevent public users from connecting to the VPN-enabled router. Multiple crypto ACLs can be configured to deny specific network traffic from crossing a […]
Continue reading…