Which two options are physical security threats?
Which two options are physical security threats? (Choose two.) A. hardware B. environment C. access lists D. device configurations E. software version
Which two options are physical security threats? (Choose two.) A. hardware B. environment C. access lists D. device configurations E. software version
Which two ports does Cisco Configuration Professional use? (Choose two.) A. 80 B. 8080 C. 443 D. 21 E. 23 Get Latest & Actual 640-554 Exam’s Question and Answers from Passleader. http://www.passleader.com
What must be configured before Secure Copy can be enabled? A. SSH B. AAA C. TFTP D. FTP
Which two options are for securing NTP? (Choose two.) A. a stratum clock B. access lists C. Secure Shell D. authentication E. Telnet
Which two protocols can SNMP use to send messages over a secure communications channel? (Choose two.) A. DTLS B. TLS C. ESP D. AH E. ISAKMP
Which command configures logging on a Cisco ASA firewall to include the date and time? Get Latest & Actual 640-554 Exam’s Question and Answers from Passleader. http://www.passleader.com A. logging facility B. logging enable C. logging timestamp D. logging buffered debugging
Which IOS feature can limit SSH access to a specific subnet under a VTY line? A. access class B. access list C. route map D. route tag
When a company puts a security policy in place, what is the effect on the company’s business? A. minimizing risk B. minimizing total cost of ownership C. minimizing liability D. maximizing compliance
Which type of IPS can identify worms that are propagating in a network? A. signature-based IPS B. policy-based IPS C. anomaly-based IPS D. reputation-based IPS
Which Cisco product can help mitigate web-based attacks within a network? A. Adaptive Security Appliance B. Web Security Appliance C. Email Security Appliance D. Identity Services Engine