routing protocol authentication
Local AAA authentication provides a way to configure backup methods of authentication, but login local does not.
The authentication process stops. [adef]
identification of Layer 3 protocol support on hosts
TCP and UDP port scanning
5. Which Cisco IOS subcommand is used to compile an IPS signature into memory? retired true event-action produce-alert retired false event-action deny-attacker-inline
retired false
6. Why are DES keys considered weak keys? They are more resource intensive. DES weak keys use very long key sizes. They produce identical subkeys. DES weak keys are difficult to manage.
They produce identical subkeys.
granularity control within applications
The Cisco IOS image file is not visible in the output of the show flash command.
9. The corporate security policy dictates that the traffic from the remote-access VPN clients must be separated between trusted traffic that is destined for the corporate subnets and untrusted traffic destined for the public Internet. Which VPN solution should be implemented to ensure compliance with the corporate policy? MPLS hairpinning GRE split tunneling
split tunneling
The ASAs must all be running the same ASDM version.
ASDM must be run as a local application.
11. What is negotiated in the establishment of an IPsec tunnel between two IPsec hosts during IKE Phase 1? ISAKMP SA policy DH groups interesting traffic transform sets
ISAKMP SA policy
The ZPF is not dependent on ACLs.
ZPF policies are easy to read and troubleshoot.
required steps to ensure consistent configuration of all company switches
14. What algorithm is used to provide data integrity of a message through the use of a calculated hash value? RSA DH AES HMAC
HMAC
an uplink port to another switch
A router interface can belong to only one zone at a time.
The password cisco123 is wrong.
18. Refer to the exhibit. The ip verify source command is applied on untrusted interfaces. Which type of attack is mitigated by using this configuration? DHCP spoofing DHCP starvation STP manipulation MAC and IP address spoofing
MAC and IP address spoofing
The crypto map has not yet been applied to an interface.
20. What type of algorithms require sender and receiver to exchange a secret key that is used to ensure the confidentiality of messages? symmetric algorithms hashing algorithms asymmetric algorithms public key algorithms
symmetric algorithms