allows a Cisco ACS server to minimize delay by establishing persistent TCP connections
Keep a secure copy of router operating system images.
Configure the router with the maximum amount of memory possible.
It uses UDP port 500 to exchange IKE information between the security gateways.
209.165.201.1
Traffic that is sent from the DMZ and the LAN to the Internet is considered outbound.
The code has not been modified since it left the software publisher.
The code is authentic and is actually sourced by the publisher.
29. Which interface option could be set through ASDM for a Cisco ASA? default route access list VLAN ID NAT/PAT
VLAN ID
uses connection information maintained in a state table
analyzes traffic at Layers 3, 4 and 5 of the OSI model
can be implemented as software or as a service
examines logs and events from systems and applications to detect security threats
consolidates duplicate event data to minimize the volume of gathered data
32. Which type of traffic is subject to filtering on an ASA 5505 device? public Internet to inside public Internet to DMZ inside to DMZ DMZ to inside
inside to DMZ
33. Which IDS/IPS signature alarm will look for packets that are destined to or from a particular port? honey pot-based anomaly-based signature-based policy-based
signature-based
34. Which three actions can the Cisco IOS Firewall IPS feature be configured to take when an intrusion activity is detected? (Choose three.) reset UDP connection reset TCP connection alert isolate inoculate drop
reset TCP connection
alert
drop
35. Which two protocols can be selected using the Cisco AnyConnect VPN Wizard to protect the traffic inside a VPN tunnel? (Choose two.) Telnet SSH SSL ESP IPsec
SSL
IPsec
A single CLI view can be shared within multiple superviews.
37.
Penetration testing = used to determine the possible consequences of successful attacks on the network.
Vulnerability scanning = used to find weaknesses and misconfigurations on network systems.
Network scanning = used to discover available resources on the network.
38. Which statement describes the use of certificate classes in the PKI? A class 5 certificate is more trustworthy than a class 4 certificate. Email security is provided by the vendor, not by a certificate. The lower the class number, the more trusted the certificate. A vendor must issue only one class of certificates when acting as a CA.
trustworthy
The hosts that are identified in the ACL will have access to the device.
Use a web browser to visit the destination website.