What three tasks can a network administrator accomplish with the Nmap and Zenmap security testing tools? (Choose three.)

Last Updated on April 30, 2021 by Admin What three tasks can a network administrator accomplish with the Nmap and Zenmap security testing tools? (Choose three.) operating system fingerprinting assessment of Layer 3 protocol support on hosts open UDP and TCP port detection security event analysis and reporting password recovery development of IDS signatures Answers […]
Continue reading…

 

What type of network security test uses simulated attacks to determine the feasibility of an attack as well as the possible consequences if the attack occurs?

Last Updated on April 30, 2021 by Admin What type of network security test uses simulated attacks to determine the feasibility of an attack as well as the possible consequences if the attack occurs? penetration testing network scanning integrity checking vulnerability scanning Answers Explanation & Hints: There are many tests that are used by security […]
Continue reading…

 

Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next?

Last Updated on April 30, 2021 by Admin Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the Internet. Which configuration command should be used next? nat (inside,outside) dynamic NET1 nat (outside,inside) dynamic NET1 nat (inside,outside) dynamic interface nat (outside,inside) dynamic interface Answers Explanation […]
Continue reading…

 

In the implementation of network security, how does the deployment of a Cisco ASA firewall differ from a Cisco IOS router?

Last Updated on April 30, 2021 by Admin In the implementation of network security, how does the deployment of a Cisco ASA firewall differ from a Cisco IOS router? ASA devices use ACLs that are always numbered. ASA devices do not support an implicit deny within ACLs. ASA devices support interface security levels. ASA devices […]
Continue reading…

 

Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group name SERVICE1 ?

Last Updated on April 30, 2021 by Admin Refer to the exhibit. A network administrator is configuring an object group on an ASA device. Which configuration keyword should be used after the object group name SERVICE1 ? ip tcp udp icmp Answers Explanation & Hints: Because this is a service object group, the keyword should […]
Continue reading…

 

Refer to the exhibit. A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces?

Last Updated on April 30, 2021 by Admin Refer to the exhibit. A network administrator is configuring the security level for the ASA. What is a best practice for assigning the security level on the three interfaces? Outside 0, Inside 35, DMZ 90 Outside 40, Inside 100, DMZ 0 Outside 0, Inside 100, DMZ 50 […]
Continue reading…

 

Which special hardware module, when integrated into ASA, provides advanced IPS features?

Last Updated on April 30, 2021 by Admin Which special hardware module, when integrated into ASA, provides advanced IPS features? Content Security and Control (CSC) Advanced Inspection and Prevention (AIP) Advanced Inspection and Prevention Security Services Card (AIP-SSC) Advanced Inspection and Prevention Security Services Module (AIP-SSM) Answers Explanation & Hints: The advanced threat control and […]
Continue reading…

 

Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario for Zones A, B, and C?

Last Updated on April 30, 2021 by Admin Refer to the exhibit. An administrator creates three zones (A, B, and C) in an ASA that filters traffic. Traffic originating from Zone A going to Zone C is denied, and traffic originating from Zone B going to Zone C is denied. What is a possible scenario […]
Continue reading…

 

What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?

Last Updated on April 30, 2021 by Admin What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites? By applying the ACL on a public interface, multiple crypto ACLs can be built to prevent public users from connecting to the VPN-enabled router. Multiple crypto ACLs can be configured […]
Continue reading…