81-120 Flashcards
(34 cards)
Which 802.1x component enforces the network access policy? A. RADIUS Server B. Authentication server C. Supplicant D. Authenticator
Authenticator
Which two advantages does the on-premise model for MDM deployment have over the cloudbased model? (Choose two)
A. The on-premise model is easier and faster to deploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model provides more control of the MDM solution than the cloud-based model
E. The on-premise model generally has less latency than the cloud-based model
The on-premise model provides more control of the MDM solution than the cloud-based model
The on-premise model generally has less latency than the cloud-based model
How can you prevent NAT rules from sending traffic to incorrect interfaces?
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line
C. Configure twice NAT instead of object NAT
D. Use packet-tracer rules to reroute misrouted NAT entries
Assign the output interface in the NAT statement
What are characteristics of the Radius Protocol? (Choose two)
A. Uses TCP port 49
B. Uses UDP Port 49
C. Uses TCP 1812/1813
D. Uses UDP 1812/1813
E. Combines authentication and authorization
Uses UDP 1812/1813
Combines authentication and authorization
Which command is to make sure that AAA Authentication is configured and to make sure that user can access the exec level to configure?
A. AAA authentication enable default local
B. AAA authentication enable local
C. AAA authentication enable tacacs+ default
AAA authentication enable default local
Which primary security attributes can be achieved by BYOD Architecture?(Choose two) A. Trusted enterprise network B. public wireless network C. checking compliance with policy D. pushing patches
Trusted enterprise network
checking compliance with policy
A user reports difficulties accessing certain external web pages, when examining traffic to and from the external domain in full packet captures, you notice many SYNs that have the same sequence number, source, and destination IP address, but have different payloads. Which problem is a possible explanation of this situation?
A. insufficient network resources
B. failure of full packet capture solution
C. misconfiguration of web filter
D. TCP injection
TCP injection
What is the primary purpose of the Integrated Services Routers (ISR) in the BYOD solution?
A. Provide connectivity in the home office environment back to the corporate campus
B. Provide WAN and Internet access for users on the corporate campus
C. Enforce firewall-type filtering in the data centre
D. Provide connectivity for the mobile phone environment back to the corporate campus
Provide connectivity in the home office environment back to the corporate campus
Which is not a function of mobile device management (MDM)?
A. Enforce strong passwords on BYOD devices
B. Deploy software updates to BYOD devices
C. Remotely wipe data from BYOD devices
D. Enforce data encryption requirements on BYOD devices
Deploy software updates to BYOD devices
The purpose of the certificate authority (CA) is to ensure what?
A. BYOD endpoints are posture checked
B. BYOD endpoints belong to the organization
C. BYOD endpoints have no malware installed
D. BYOD users exist in the corporate LDAP directory
BYOD endpoints belong to the organization
The purpose of the RSA SecureID server/application is to provide what?
A. Authentication, authorization, accounting (AAA) functions
B. One-time password (OTP) capabilities
C. 802.1X enforcement
D. VPN access
One-time password (OTP) capabilities
What does ASA Transparent mode support? A. It supports OSPF. B. It supports the use dynamic NAT. C. IP for each interface. D. Requires a management IP address.
It supports the use dynamic NAT.
What will happen with traffic if zone-pair created, but policy did not applied?
A. All traffic will be dropped.
B. All traffic will be passed with logging.
C. All traffic will be passed without logging.
D. All traffic will be inspected.
All traffic will be dropped.
Which Cisco IOS device support firewall, antispyware, anti-phishing, protection, etc.? A. Cisco IOS router B. Cisco 4100 IOS IPS appliance C. Cisco 5500 series ASA D. Cisco 5500x next generation ASA
Cisco 5500x next generation ASA
What configurations are under crypto map? (Choose two) A. set peer B. set host C. set transform-set D. interface
set peer
set transform-set
Which two options are Private-VLAN secondary VLAN types? (Choose two) A. Isolated B. Secured C. Community D. Common E. Segregated
Isolated
Community
Which type of VLANs can communicate to PVLANs? (or something like this) (Choose two) Which two are valid types of VLANs using PVLANs? (choose two) A. promiscuous B. isolated C. community D. backup E. secondary
isolated
community
What protocol provides CIA?
A. HA B. ESP C. IKEV1 D. IKEV2
ESP
Drag the recommendations on the left to the Cryptographic Algorithms on the right. Options will be used more than once.
Avoid ,Legacy
DES, 3DES, MD5, SHA1, HMAC-MD5
Des- avoid
3DES - Legacy
MD5 - Avoid
SHA1, HMAC-MD5 - legacy
What are two reasons to recommend SNMPv3 over SNMPv2? (Choose two)
A. SNMPv3 is secure because you can configure authentication and privacy.
B. SNMPv3 is a Cisco proprietary protocol.
C. SNMPv2 is secure because you can configure authentication and privacy.
D. SNMPv2 is insecure because it sends information in clear text.
E. SNMPv3 is insecure because it sends information in clear text.
SNMPv3 is secure because you can configure authentication and privacy.
SNMPv2 is insecure because it sends information in clear text
Which two are valid types of VLANs using PVLANs? (Choose two) A. Backup VLAN B. Secondary VLAN C. Promiscuous VLAN D. Community VLAN E. Isolated VLAN
Community VLAN
Isolated VLAN
Which security principle has been violated if data is altered in an unauthorized manner? A. accountability B. availability C. confidentiality D. integrity
integrity
Which two actions can a zone-based firewall apply to a packet as it transits a zone pair? (Choose two) A. drop B. inspect C. queue D. quarantine E. block
Drop
Inpect
Which information can you display by executing the show crypto ipsec sa command?
A. proxy information for the connection between two peers
B. IPsec SAs established between two peers
C. recent changes to the IP address of a peer router
D. ISAKMP SAs that are established between two peers
IPsec SAs established between two peers