Final Second Half

Is this your test? Login to manage it. If not, you can generate a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Fill in the blank.
When role-based CLI is used, only the _____________ view has the ability to add or remove commands from existing views.
2.
1 point
Place the system development cycle (SDLC) phases in the order they occur (Not all options are used)
(Drag and drop)
3.
1 point
A user complains about not being able to gain access to the network. What command would be used by the network administrator to determine which AAA method list is being used for this particular user as the user logs on?
4.
1 point
What is an example of toll fraud?
5.
1 point
Logging into a computer as the administrator just to surf the web is a violation of which security technique?
6.
1 point
What three phases would be addressed as part of doing business continuity planning? (Choose three.)
7.
1 point
In a corporate network where SAN is deployed, what happens if the SAN fabric is compromised?
8.
1 point
Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C
9.
1 point
What command must be issued to enable login enhancements on a Cisco router?
10.
1 point
What is the role of the Cisco NAC Manager in implementing a secure networking infrastructure?
11.
1 point
A large company deploys several network-based IPS sensors for its headquarters network. Which network service configuration will help the process of correlating attack events happening simultaneously in different points of the network?
12.
1 point
What is one way to prevent attackers from eavesdropping on VoIP conversations?
13.
1 point
Which three statements should be considered when applying ACLs to a Cisco router? (Choose three.)
14.
1 point
What is a CLI initiated script that locks down the control plane of a Cisco router in one step?
15.
1 point
What is an advantage of using CCP rather than the CLI to configure an ACL?
IPsec is supported.
16.
1 point
Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)
17.
1 point
Which three types of remote access VPNs are supported on ASA devices? (Choose three.)
18.
1 point
Fill in the blank.
In a syslog implementation, a router that generates and forwards syslog messages is known as a syslog _______
19.
1 point
Refer to the exhibit. According to the command output, which three statements are true about the DHCP options entered on the ASA 5505? (Choose three.)
20.
1 point
Refer to the exhibit. What will be displayed in the output of the show running-config object command after the exhibited configuration commands are entered on an ASA 5505?
21.
1 point
Refer to the exhibit. An administrator has configured an ASA 5505 as indicated but is still unable to ping the inside interface from an inside host. What is the cause of this problem?
22.
1 point
Which three wizards are included in Cisco ASDM 6.4? (Choose three.)
23.
1 point
What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)
24.
1 point
Which security feature helps protect a VoIP system from SPIT attacks?
25.
1 point
Why is a reflexive ACL harder to spoof compared to an extended ACL that uses the established keyword?
26.
1 point
Two devices that are connected to the same switch need to be totally isolated from one another. Which Cisco switch security feature will provide this isolation?
27.
1 point
Which statement accurately describes Cisco IOS zone-based policy firewall operation?
28.
1 point
Which two options are offered through the Cisco TrustSec Solution for enterprise networks? (Choose two.)
29.
1 point
Refer to the exhibit. What is the purpose of the highlighted inspect line?
30.
1 point
A company is designing its strategy of deploying Cisco Secure ACS to manage user access. The company is currently using a Windows server for the internal authentication service. The network administrator needs to configure the ACS to contact the Windows server when it cannot find the user in its local database. Which option of external user database setup should be configured on ACS?
31.
1 point
Which security organization updates the training material that helps prepare for the Global Information Assurance Certification (GIAC)?