![]() ![]() Weakness that compromises either the security or the functionality of a systemĬ. Any circumstance or event with the potential to cause harm to an assetī. Match the key security concept with its description.Ī. A small forged packet elicits a large reply from the reflectors. A large forged packet elicits a large reply from the reflectors. A large forged packet elicits a small reply from the reflectors.ĭ. A small forged packet elicits a large reply from the reflectors.Ĭ. A small forged packet elicits a small reply from the reflectors.ī. Which statement regarding an amplification attack is correct?Ī. The attack caused DDoS that made it impossible for anyone to resolve the organization's website IP address and access the website. Whois You are reading an article in the news regarding a DNS amplification attack to a specific organization. Which two command-line tools can you use on a Microsoft Windows computer?ī. Nmap Project You want to display public information regarding your company's domain from the public DNS registries so you can see what information can be gathered by a reconnaissance attack on the DNS. What is the initiative that runs this website?ĭ. You are working as IT security engineer, and you are browsing through the website to see the top network security tools, as well as find more details on each particular tool and read reviews for it. Specify a minimum length of a password, such as 8 to 12 characters. Implement account lock-out after a number of bad guesses.Ĭ. Implement password complexity, such as all upper-case characters in the password. Specify a maximum length of a password, such as 8 to 12 characters.Į. Specify a minimum length of a password, such as 8 to 12 characters.ĭ. Email attachments Which two of the following security measures can help block password brute force attacks?ī. Phishing Which three represent common vectors that can inflict data loss and exfiltration regarding unauthorized transfer of company data? (Choose 3.)į. Which is a common social engineering technique?ĭ. Virus You are asked to conduct a training session in your company to educate employees about social engineering attacks. Which two malware types can compromise other systems?ī. The anti-malware software in your company has discovered malicious software that replicated itself on several computers with functional copies that can cause the same type of damage. Impersonating public Wi-Fi network, while redirecting connected users to internet. Which two options represent man-in-the-middle attacks? (Choose 2.)Į. The configuration file is not found on the TFTP server. The router configuration will be loaded from the TFTP server.ĭ. The router will attempt to load the configuration from the NVRAM.ī. What can you conclude based on the messages?Ī. During the reboot, the following messages appear on the console: TFTP server You have restarted a router, which has the default booting procedure. After the Cisco IOS Software image is loaded and started from which three components can the device load its configuration? (Choose three.)į. The configuration file merges with any existing configurations in RAM. The router will keep only the previous configuration. On all platforms, except the Class A flash file system platforms, the previous copy of the configuration will be stored in NVRAM.ĭ. The configuration file merges with any existing configurations in RAM.Ĭ. The copied file will overwrite the previous configuration.ī. TFTP When you copy configuration files from another source, such as TFTP, into RAM on a Cisco router, what will happen to the previous configuration?Ī. verify/md5 flash image_name.bin Which protocol is used to allow Cisco IOS image and configuration uploads and downloads over the network?Į. to enable you to create a basic initial configuration Which command can you use to check whether the Cisco IOS image has errors because of file transfer?ĭ. to enable you to create a basic initial configurationĭ. to enable you to set up a fault-tolerate boot planī. ![]() least-significant 4 bits What is the purpose of the setup utility?Ī. RAM Which bits of the configuration register make up the boot field?ĭ. 0x2 to 0xF Where does the decompressed Cisco IOS file reside before it is started?ĭ. Which configuration register boot field values cause the router to check the startup configuration file for boot system commands during the Cisco router boot process?ĭ.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |