Which of the following commands is used in global configuration mode...
What type of hacker attempts to hack telephony systems?
What Cisco IOS feature provides a graphical user interface for...
What are the three primary goals of network security?
Which of the following is a weakness in an information system that an...
What security design philosophy uses a layered approach to eliminate...
Which of the following best describes a smurf attack?
Which of the following is a method of gaining access to a system that...
Which of the following offers a variety of security solutions...
An IOS router's privileged mode, which you can access by entering the...
In the banner motd # command, what does # represent?
What management topology keeps management traffic isolated from...
Where do most attacks on an organization's computer resources...
What line configuration mode command would you enter to prevent a line...
What STP protection mechanism disables a switch port if the port...
To protect a routers image and configuration against a attackers...
Information about a managed device's resources and activity is defined...
The enable secret password appears as an M5 hash in a router's...
When SSH is configured, what is the Cisco minimumrecomended modulus...
If you click the configure button along the top of Ciscos SDM's GUI,...
The U.S government places classified data into which classes?
How do you define the authentication methos that will be used with...
A Cisco Catalyst switch stores port MAC address assignments in what...
What kind of MAC address is dynamicly learned by a switch port and...
Which of the following is a continually changing document that...
Which of the following makes the end-user community concious of...
How is a CLI view different from a privilege level?
Each Cisco ACL ends with which of the following?
What are 2 types of IP spoffing attacks?
When you configure Cisco IOS login enhancements for virtual...
Which of the following best describes vishing?
What Cisco Catalyst switch feature can isolate ports from one another,...
Which security policy component contains mandatory practices ( as...
Which of the following are authentication methods that may be used...
Which of the following router services can best help administrators...
If a switch is running in the fail-open mode, what happens when ...
What are 3 potential responses of a switch port to a security...
Which 3 individuals are most likely to be intimately involved with the...
What are 2 automated approaches for hardening the security of a Cisco...
Which of the following is the basisof all major SAN transport...
All of the following are common elements of a network design. ...
What are two options for running Cisco SDM?
Which of the following ports are used with RADIUS authentication and...
The great majority of software vulnerabilities that have been...
What term refers to the electromagnetic interference (EMI) that can...
What are 3 characteristics of a Cisco Self-Defending Network?
When is a Cisco Catalyst switch port placed in a restricted VLAN?
Which of the following attacks against VoIP network attemps to deplete...
VoIP spam is also known by which of the following acronyms?
What kind of intergrity attack is a collection of small attacks the...
To configure accounting in AAA, from which mode should the aaa...
If you need to use SNMP on your network, what version does Cisco...
Which of the following is not a phase in a worm attack?
Which of the following is not a reasonfor an organization to...
Which of the following VoIP components can permit or deny a call...
What type of firewall is required to open appropiate UDP ports...
Which of the following are Cisco best practice recommendations for...
What Cisco Catalyst switch feature can be used in an Intrusion...
Some ISRs include a USB port, into which a flash drive can...
What happens to a client that successfully authenticates with a Cisco...
Which type of law typically involves the enforcement of regulations by...
To enable AAA through the SDM, you choose which of the following?
Litigators typicall require 3 of the following elements to present an...
Which of the following attemps to ensure that no one employee becomes...
What level syslog logging is associated with warnings?
Which of the following Cisco Catalyst switch mechanisms can be used to...
The following formula can be used to calculate annualized loss...
What type of threat combines worm, virus and trojan horse...
What is an IOS router's default response to multiple failed login...
A RADIUS server acts as which component in a 802.1x deployment?
Spoofing represents an attack against data ______?
A static packet-filtering firewall does which of the following?
During the probe phase of a worm attack, which of the following might...
What are 3 phases of disaster recovery?
In an IEEE 802.1x deployment, EAPOL messages typically are sent...
Which RADIUS message type contains AV pairs for username and password?
What type of message might an attacker send to a host to convince the...
Which of the following is perceived as a drawback of implementing...
The Dynamic Vector Streaming (DVS) engine is a scanning technology...
Which Cisco security agent Interceptor is responsible for intercepting...
Cisco defines 3 catagories of security controls: administrative,...
Which command configures a Cisco Catalyst switch port to operate in...
When creating an extended ACL, which of the following number ranges...
Which command should be used to enable AAA authetication to determine...
A Cisco IP phone can send traffic from an attached PC in a data VLAN...
Which of the following firewall best practices can help mitigate worm...
What does the aaa authentication login console-in local command do?
What are the 2 approaches for launching a VLAN hopping attack?
Which of the following are valid SDM configuration wizards?
What is the name of the e-mail traffic monitoring service that...
At what level is LUN masking implemented?
A LUN is used by which of the following protocols as a way to...
Which of the following are the two primary port authentication...
Which 2 of the following statements are true about Cisco IP phones web...
You administer a network that contains analog telephony devices...
You examine you IDS event veiwer and find that IP address...
What EAP type usually leverages MS-CHAPv2 as its authentication...
Application inspection firewalls are aware of the state of which...
Which of the following are valid responses that the TACACS+ daemon...
To view the satus of your turbo ACLs which command would you...
Which of the following are true of the Turbo AC feature?
What are the 5 phases of the system development life cycle...
Which of the following browsers are supported for use with Cisco...
Which of the following statements correctly describes Fiber channell...
Which of the following are features provided by Cisco Secure ACS 4.0...
Which of the following is not a limitation of a stateful firewall?
Which of the following arconcidered IOS security features?
Hardening your application software involves what?
Which of the following are justifications for migrating from...
Which 2 protocols can be used to carry voice d=media packets?
What 2 Cisco Catalyst features can be used to mitigate...
Which of the following are features provided by the Cisco NAC device...
Network containment is provided by which of the following Cisco...
What does the Cisco Security Agent do when an operating system call to...
Which of the following represent SAN transport technologies?
Which of the following are classes of SAN attacks?
Which of the following are advantages of an application layer...
Which of the following are network evaluation techniques?