Which type of malicious software can create a back-door into a device or network?
Which type of malicious software can create a back-door into a device or network? A. Worm B. Trojan C. Virus D. Bot
Which type of malicious software can create a back-door into a device or network? A. Worm B. Trojan C. Virus D. Bot
Which security term refers to the likelihood that a weakness will be exploited to cause damage to an asset? A. Threat B. Vulnerability C. Risk D. Countermeasure /p>
Which command enables authentication at the OSPFv2 routing process level? A. area 0 authentication message-digest B. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF C. ip ospf authentication message-digest D. ip ospf message-digest-key 1 md5 C1sc0!
What is the maximum number of methods that a single method list can contain? A. 4 B. 3 C. 2 D. 5
Which IPS detection method examines network traffic for preconfigured patterns? A. Signature-based detection B. Policy-based detection C. Anomaly-based detection D. Honey-pot detection
Why does ISE require its own certificate issued by a trusted CA? A. ISE’s certificate allows guest devices to validate it as a trusted network device. B. It generates certificates for guest devices based on its own certificate. C. ISE’s…
Which statement about interface and global access rules is true? A. Interface access rules are processed before global access rules. B. The implicit allow is processed after both the global and interface access rules. C. If an interface access rule…
Which type of social engineering attack targets top executives? A. Baiting B. Vishing C. Whaling D. Spear phishing
Which type of firewall monitors and protects a specific system? A. Proxy firewall B. Stateless firewall C. Application Firewall D. Personal Firewall
On an ASA, which maps are used to identify traffic? A. Policy maps B. Class maps C. Route maps D. Service maps