Which technique is necessary to ensure a private transfer of data using a VPN?

Which technique is necessary to ensure a private transfer of data using a VPN? authorization encryption scalability virtualization Answers Explanation & Hints: Confidential and secure transfers of data with VPNs require data encryption. For more question and answers: Click Here CA – CyberOps Associate v1.0 – Modules 11 – 12: Network Infrastructure Security Group Exam […]
Continue reading…

 

What is a function of SNMP?

What is a function of SNMP? provides statistical analysis on packets flowing through a Cisco router or multilayer switch provides a message format for communication between network device managers and agents captures packets entering and exiting the network interface card synchronizes the time across all devices on the network Answers Explanation & Hints: SNMP is […]
Continue reading…

 

Which two statements are true about NTP servers in an enterprise network? (Choose two.)

Which two statements are true about NTP servers in an enterprise network? (Choose two.) There can only be one NTP server on an enterprise network. All NTP servers synchronize directly to a stratum 1 time source. NTP servers at stratum 1 are directly connected to an authoritative time source. NTP servers ensure an accurate time […]
Continue reading…

 

Which statement describes a VPN?

Which statement describes a VPN? VPNs use dedicated physical connections to transfer data between remote users. VPNs use logical connections to create public networks through the Internet. VPNs use open source virtualization software to create the tunnel through the Internet. VPNs use virtual connections to create a private network through a public network. Answers Explanation […]
Continue reading…

 

Which statement describes a difference between RADIUS and TACACS+?

Which statement describes a difference between RADIUS and TACACS+? RADIUS uses TCP whereas TACACS+ uses UDP. RADIUS is supported by the Cisco Secure ACS software whereas TACACS+ is not. RADIUS encrypts only the password whereas TACACS+ encrypts all communication. RADIUS separates authentication and authorization whereas TACACS+ combines them as one process. Answers Explanation & Hints: […]
Continue reading…

 

Which AAA component can be established using token cards?

Which AAA component can be established using token cards? accounting authorization auditing authentication Answers Explanation & Hints: The authentication component of AAA is established using username and password combinations, challenge and response questions, and token cards. The authorization component of AAA determines which resources the user can access and which operations the user is allowed […]
Continue reading…

 

In the data gathering process, which type of device will listen for traffic, but only gather traffic statistics?

In the data gathering process, which type of device will listen for traffic, but only gather traffic statistics? NMS syslog server NetFlow collector SNMP agent Answers Explanation & Hints: A NetFlow collector is the device that receives traffic statistics from networking devices. NetFlow only gathers traffic statistics, unlike syslog and SNMP which can collect various […]
Continue reading…

 

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts? stateful packet inspection URL filtering application filtering packet filtering Answers Explanation & Hints: Stateful packet inspection on a firewall checks that incoming packets are actually legitimate responses to requests originating from hosts inside […]
Continue reading…

 

What is an advantage of HIPS that is not provided by IDS?

What is an advantage of HIPS that is not provided by IDS? HIPS provides quick analysis of events through detailed logging. HIPS deploys sensors at network entry points and protects critical network segments. HIPS monitors network processes and protects critical files. HIPS protects critical system resources and monitors operating system processes. Answers Explanation & Hints: […]
Continue reading…

 

What two components of traditional web security appliances are examples of functions integrated into a Cisco Web Security Appliance? (Choose two.)

What two components of traditional web security appliances are examples of functions integrated into a Cisco Web Security Appliance? (Choose two.) firewall URL filtering web reporting VPN connection email virus and spam filtering Answers Explanation & Hints: The Cisco Web Security Appliance is a secure web gateway which combines advanced malware protection, application visibility and […]
Continue reading…

 

What is the function of the distribution layer of the three-layer network design model?

What is the function of the distribution layer of the three-layer network design model? providing direct access to the network aggregating access layer connections providing secure access to the Internet providing high speed connection to the network edge Answers Explanation & Hints: The function of the distribution layer is to provide connectivity to services and […]
Continue reading…