Which three modes of access can be delivered by SSL VPN?

Correct Answer for the Question – Which three modes of access can be delivered by SSL VPN? is given below Which three modes of access can be delivered by SSL VPN? (Choose three.)http://www.cisco.com/en/US/docs/ios/12_4t/12_4t11/htwebvpn.html SSL VPNThe SSL VPN feature (also known as WebVPN) provides support, in Cisco IOS software, for remote user access to enterprise networks from … Read more

Which three applications comprise Cisco Security Manager?

Correct Answer for the Question – Which three applications comprise Cisco Security Manager? is given below Which three applications comprise Cisco Security Manager? (Choose three.) Configuration Manager Packet Tracer Device Manager Event Viewer Report Manager Syslog Monitor Correct Answer The Correct Answer for this Question is Configuration Manager Event Viewer Report Manager The answers for the … Read more

Which two considerations about secure network monitoring are important?

Correct Answer for the Question – Which two considerations about secure network monitoring are important? is given below Which two considerations about secure network monitoring are important? (Choose two.) log tampering encryption algorithm strength accurate time stamping off-site storage Use RADIUS for router commands authorization. Do not use a loopback interface for device management access. Correct … Read more

Which four configurations are required (with no defaults)?

Correct Answer for the Question – Which four configurations are required (with no defaults)? is given below You want to use the Cisco Configuration Professional site-to-site VPN wizard to implement a site- to-site IPsec VPN using pre-shared key. Which four configurations are required (with no defaults)? (Choose four.)http://www.cisco.com/en/US/products/ps9422/products_configuration_example09186a0080ba1d0a.shtml the interface for the VPN connection the VPN … Read more

Which type of cipher achieves security by rearranging the letters in a string of text?

Correct Answer for the Question – Which type of cipher achieves security by rearranging the letters in a string of text? is given below Which type of cipher achieves security by rearranging the letters in a string of text? Stream cipher Transposition cipher Block cipher Correct Answer The Correct Answer for this Question is Block cipher … Read more

Which three statements about RADIUS are true?

Correct Answer for the Question – Which three statements about RADIUS are true? is given below Which three statements about RADIUS are true? (Choose three.) RADIUS uses TCP port 49. RADIUS uses UDP ports 1645 or 1812. RADIUS encrypts the entire packet. RADIUS encrypts only the password in the Access-Request packet. RADIUS is a Cisco proprietary … Read more

Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS wizard?

Correct Answer for the Question – Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS wizard? is given below Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS wizard? (Choose four.)http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/prod_white_paper09 00aecd8066d265.html Select the interface(s) to apply the IPS rule. … Read more

What are three features of IPsec tunnel mode?

Correct Answer for the Question – What are three features of IPsec tunnel mode? is given below What are three features of IPsec tunnel mode? (Choose three.) IPsec tunnel mode supports multicast. IPsec tunnel mode is used between gateways. IPsec tunnel mode is used between end stations. IPsec tunnel mode supports unicast traffic. IPsec tunnel mode … Read more

Which three actions can an inline IPS take to mitigate an attack?

Correct Answer for the Question – Which three actions can an inline IPS take to mitigate an attack? is given below Which three actions can an inline IPS take to mitigate an attack? (Choose three.) modifying packets inline denying the connection inline denying packets inline resetting the connection inline modifying frames inline denying frames inline Correct … Read more

Which characteristic is a potential security weakness of a traditional stateful firewall?

Correct Answer for the Question – Which characteristic is a potential security weakness of a traditional stateful firewall? is given below Which characteristic is a potential security weakness of a traditional stateful firewall?http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/product_implementa tion_design_guide09186a00800fd670.htmlCisco IOS Firewall consists of several major subsystems:Stateful Packet Inspection provides a granular firewall engine Authentication Proxy offers a per-host access control mechanism … Read more