» Managing a Secure Network

EnsurepassHere you will find answers to Managing a Secure Network Questions Question 1 For the following attempts, which one is to ensure that no employee becomes a pervasive security threat, that data can be recovered from backups, and that information system changes do not compromise a system’s security? A.    Disaster recovery B.    Strategic security planning C.    Implementation security D.    Operations security   Answer: D Note: Operations security: day-to-day security Read more […]

» Securing Network Devices

EnsurepassHere you will find answers to Securing Network Devices Questions Question 1 As a network engineer at securitytut.com, you are responsible for the network. Which one will be necessarily taken into consideration when implementing Syslogging in your network? A. Log all messages to the system buffer so that they can be displayed when accessing the router. B. Use SSH to access your Syslog information. C. Enable the highest level of Syslogging available to ensure you log all possible event Read more […]

» Implementing Virtual Private Networks

EnsurepassHere you will find answers to Implementing Virtual Private Networks Questions Question 1 You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of which type of tunnel? A. GRE tunnel B. L2TP tunnel C. L2F tunnel D. ISAKMP tunnel   Answer: D Question 2 For the following items, which one acts as a VPN termination device and is located at a primary network location? A. Headend VPN device B. Tunnel C. Broadband service D. VPN access device   Answer: Read more […]

» Modern Network Security Threats

EnsurepassHere you will find answers to Modern Network Security Questions Question 1 Which item is the great majority of software vulnerabilities that have been discovered? A. Stack vulnerabilities B. Software overflows C. Heap overflows D. Buffer overflows   Answer: D Question 2 Which statement is true about vishing? A. Influencing users to forward a call to a toll number (for example, a long distance or international number) B. Influencing users to provide personal information over the Read more […]

» Cryptographic Systems

EnsurepassHere you will find answers to Cryptographic Systems Questions   Question 1 Please choose the correct matching relationships between the cryptography algorithms and the type of algorithm. 1 3DES 2 RSA 3 Diffie-Hellman 4 AES 5 IDEA 6 Elliptical Curve A. Symmetric – 1, 2 and 3 Asymmetric – 4, 5 and 6 B. Symmetric – 1, 4 and 5 Asymmetric – 2, 3 and 6 C. Symmetric – 2, 4 and 5 Asymmetric – 1, 3 and 6 D. Symmetric – 2, 5 and 6 Asymmetric – 1, 3 and 4   Answer: Read more […]

» Drag and Drop Questions

EnsurepassHere you will find answers to Drag and Drop Questions Notice: In the exam, some Drag and Drop Questions may be represented as multiple-choice questions. Question 1 On the basis of the description of SSL-based VPN, place the correct descriptions in the proper locations.   Answer: + The authentication process uses hashing technologies. + Asymmetric algorithms are used for authentication and key exchange. + Symmetric algorithms are used for bulk encryption. Question 2 Which three Read more […]

» Storage Area Network SAN

EnsurepassHere you will find answers to Storage Area Network SAN Questions   Note: A storage-area network (SAN) is a specialized network that enables fast, reliable access among servers and external storage resources. Question 1 Which two primary port authentication protocols are used with VSANs? (Choose two.) A. ESP B. CHAP C. DHCHAP D. SPAP   Answer: B C Explanation Two primary port authentication protocols when working with VSANs: + Challenge Handshake Authentication Protocol Read more […]

» Securing Local Area Networks

EnsurepassHere you will find answers to Securing Local Area Networks Questions Question 1 You suspect an attacker in your network has configured a rogue layer 2 device to intercept traffic from multiple VLANS, thereby allowing the attacker to capture potentially sensitive data. Which two methods will help to mitigate this type of activity? (Choose two) A. Turn off all trunk ports and manually configure each VLAN as required on each port B. Disable DTP on ports that require trunking C. Secure the Read more […]

» Access list Questions

EnsurepassQuestion 1 Which statement best describes the Turbo ACL feature? (Choose all that apply) A. The Turbo ACL feature processes ACLs into lookup tables for greater efficiency. B. The Turbo ACL feature leads to increased latency, because the time it takes to match the packet is variable. C. The Turbo ACL feature leads to reduced latency, because the time it takes to match the packet is fixed and consistent. D. Turbo ACLs increase the CPU load by matching the packet to a predetermined list.   Answer: Read more […]

» Security Fundamentals

EnsurepassHere you will find answers to Security Fundamentals Question 1 Which classes does the U.S. government place classified data into? (Choose three) A. SBU B. Confidential C. Secret D. Top-secret Answer: B C D Explanation Data should be classified so that administrators can do their best to secure that data. Below is a common way to classify data that many governments, including the military, use: Unclassified: Data that has little or no confidentiality, integrity, or availability requirements Read more […]

» Implementing Intrusion Prevention

EnsurepassHere you will find answers to Implementing Intrusion Prevention Questions Question 1 When configuring Cisco IOS login enhancements for virtual connections, what is the “quiet period”? A. A period of time when no one is attempting to log in B. The period of time in which virtual logins are blocked as security services fully initialize C. The period of time in which virtual login attempts are blocked, following repeated failed login attempts D. The period of time between successive Read more […]

» Authentication and Encryption 2

EnsurepassHere you will find answers to Authentication and Encryption – Part 2 // // Question 1 What two statements are true about AES-CCMP? (Choose two) A. It is an encryption algorithm used in the 802.11i security protocol. B. It is defined in 802.1X. C. It is the encryption algorithm used in TKIP implementations. D. It is required in WPA. E. It is required in WPA2.   Answer: A E Explanation Advanced Encryption Standard (AES) is the cipher system used by RSN. It is the equivalent of Read more […]

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com