Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.
Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.
On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.
Share UsSharing is Caring
It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.
A comprehensive resource for staying up-to-date with the latest security threats, technologies, and best practices to protect your network and data.
True or False? Cisco switches should be configured in production to send syslog messages to the ISE MNT node.
It is a self-replicating program that is harmful to networks.
It is another term for a runtime error
It is a restricted area with a resource that these Java applications can access.
Software that makes each network devices works and do its job is called?
The goal of ______________ is to reduce the exposure of the organization to malicious code.
State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system.
What are the signs and symptoms that your device/s are getting infected by any malware. (Choose all that applies)
It helps prevent attackers from monitoring or recording traffic between resources and computers.
You should be able to block unauthorized users and devices from accessing your network.
A set of instructions and execute a specific task/s
Which one is not a component of fiber optics?
A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
____________ is used to describe those hackers who use their computer skills with malicious intent for illegal purposes or nefarious activities.
It may contain phishing scams and malware.
It disguises as useful software.
An information that is only accessed by an authorized person.
Another term for Port security.
It helps keep data and equipment safe by giving only the appropriate people access.
Which of the following protocols is best suited for granular command level control with device administration AAA?
These are the events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
Always disable unnecessary features of the web server that are not going to be used
You can configure user rights on the system, auditing, and other security settings such as creating a logon banner
An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.
Which of the following are types of AAA as related to the topics of this exam?
It is anything that can disrupt the operation, functioning, integrity, or availability of a network or system
What is a stand alone computer?
This is a way of adding secondary layer of security to your account password.
It is the connection of two or more computer that share its resources
If the network isn't a line or a point: it's a _____________.
This attack uses any password-cracking software to mathematically calculate every possible password.
Two different devices can communicate with each other regardless of the manufacturer as long as they have the same protocol.
It is a special system used in industrial environments and settings to monitor their operations
Human beings are inevitably the weakest security link. You need to implement technologies and processes to ensure that staffers don't deliberately or inadvertently send sensitive data outside the network.
Software designed to detect, disable, and remove viruses, worms, and Trojans.
In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.
True or False? The supplicant is required to trust the certificate of the authentication server before it will form the TLS tunnel within which the EAP transaction will occur.
Networking device that has a filtering feature where it sends the traffic only to the port of the destination device.
is a crucial security update that you should always apply to your system
Type of software that is often called as end-user programs.
This is data being transported on a network.
Which of the following items are not valid terms for the names of the 7 OSI layers?
Preventive security is implemented by the tasks and tools you use to prevent unauthorized people or programs from accessing your networks and the devices connected to them.
An act that exploits a weakness in a system.
It was the first generation security standard for wireless network.
Which of these are not part of the two categories of Group Policy. (Choose any that applies)
It is an act that exploits a vulnerability.
it is the one managing the computer hardware resources in addition to applications and data.
Big corporations are not at risks to any form of security breach.
any program design to damage specific file or computer system.
Why is RADIUS or TACACS+ needed? Why can’t the end user authenticate directly to the authentication server?
True or False? 802.1X can be configured on all switch interfaces, including Layer-3 interfaces.
Layer that is responsible for establishing and maintaining connections.
Identify which of the following is NOT a potential risk to the network security.
These are created with malicious intent and sent by attackers.
These layers work together to transmit the data from one person to another world wide.
True or False? IEEE 802.1X may use TACACS+ to communicate the EAP identity to the authentication server.
Worms can be classified as a type of computer virus that needs a third party or a user to replicate and spread through the system.
Which of the following Cisco products should be used for device administration with TACACS+?
SMTP and FTP are used to transfer information over a computer network.
Worm has the ability to replicate itself without a host program and spread independently while viruses rely on human activity to spread and damage a system or file.
This refers to the events or attacks that steal, damage, or destroy equipment.
It is sometimes called TCP hijacking attack.
It will help the company to provide a better strategy in keeping a data secured while avoiding intruders to alter or steal important and confidential information.
True or False? RADIUS can be used for device administration AAA.
OSI Layer that is sometimes called HCI layer.
It determines whether you are allowed to access a specific information or file.
A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet.
Developers should always implement validation at both the client and the server to obtain high level of security.
Which three probes exist with device sensor?
It is a combined set of components for collecting, storing and processing data and for providing information, facts and knowledge.
What are two ways to collect HTTP user agent strings?
What is the purpose of an outer identity?
Data Link Layer enables data transfer between two devices on the same network.
Refers to the information system which ensures that the information remains accurate.
One example is when an employee intends to cause damage.
Is a service responsible for sending messages to other computers or users.
Which interface-level command is the equivalent of “turn authentication on”?
very single application must go through the options and check whether each application is configured in the most secure state.
Brute force attack are often successful because most of the users uses different ordinary words as their passwords.
A type of malware that automatically sends advertisements to the users.
You must be able to identify when the configuration has changed or when some network traffic indicates a problem.
What will happen when an ISE administrator has modified a profile and then a Feed Service update is downloaded that contains an updated version of that profile?
It provides data routing paths where data will take for network communication.
This is when the user damages data or equipment unintentionally.
True or False? The profiling service is enabled by default on ISE policy service nodes.
Software vendors used to find out about the vulnerabilities of their system after receiving some reports from their users.
When configuring a Cisco switch for 802.1X, at which level of the configuration do the 802.1X-related commands exist?
File system that has a features like permissions, encryption, quotas, and auditing services.
In implementing network security, company should invest more in preventing or avoiding any security breach over detecting and responding to any form of attack
All the following are type of addresses except -__________.
It is a core feature of Windows that permits the network administrator to enable and disable different features in Windows
A security layer used in mobile devices that employ the Wireless Applications Protocol (WAP).
When using RADIUS, what tells the AAA server which type of action is being authenticated?
What does WAN stand for?
Which of these are not part of security model that is very popular to information security.
Any form of security incident that is properly handled can and eventually will turn into a bigger problem.
This is an enhanced encryption protocol combining a 104-bit key and a 24-bit initializing vector.
True or False? A machine authentication may use EAP-FAST.
This layer involves devices such as router, UTP Cables and other networking devices to transfer data.
What are the three main components of IEEE 802.1X?
This is an improved version of WEP.
Any form of security incident that is not properly handled can and eventually wont turn into a bigger problem that will lead to a damaging data breach and wont cause large amount of expense or it will collapse the whole system
A software that can detect malware.
How are updated profiles distributed to customer ISE deployments?
If there's one common theme among security experts, it's that relying on one single line of defense is dangerous, because any single defensive tool can be defeated by a determined adversary.
A popular feature of Windows that allows you to harden multiple systems quickly.
Which network topology is the fastest?
It pretends to be a legitimate programs in order to gain access to a system.
What does LAN stand for?
It is a type of an injection attack that makes it possible to insert and execute malicious SQL statements
Is any program that is harmful to a computer user.
What is the name of the “secure cookie” used with EAP-FAST that can be used in lieu of a certificate, or even in addition to a certificate?
Which network topology requires terminators?
It is the idea of developing a database system to store and retrieve large volumes of data
This attack happens when the attacker or hacker sends too much information to the application causing it to overflow
It serves as a proof and verifies that you are the person you say you are or what you claim to be.
It can manipulate your system including the deletion of the important files on your computer.
When configuring a Cisco Wireless LAN Controller (WLC) for communication with ISE, what must be configured for the wireless LAN (WLAN)? (Choose two.)
Which of these are not part of the reason why network security is important (Choose all that applies)
An attack that allows any unauthorized users a way or passage to get inside a restricted area.
This is a networking infrastructure company.
These are logon information from all the websites you visit and is stored in memory on computer
_Select the statement that is NOT an advantage of a LAN.
True or False? A tunneled EAP type is able to use native EAP types as its inner method.
Information policy where the data should be access by an authorized person/s only.
Type of malware that may contain an attachment to an email that loads malware onto your computer system.
Which supplicant(s) is capable of EAP chaining?
These are what make networks prone to information loss and downtime
Is the process of using social skills to encourage people to disclose their credentials
Which command will validate that authentications are being attempted, which authentications are successful, and which authorization results have been assigned?
It ensure that the essential and vital services are only running on the system
FM radio signal is an example of full-duplex communication.
To avoid and prevent this type of attack, users should always choose the “Remember Me” option when logging in to any web site.
How many key phases are there in an incident response plan ?
Which ISE tool enables an administrator to drill down in to the profiles that have been assigned to locate a specific endpoint with that profile?
Which of the following is independent malicious program that need not any host program?
It can limit which devices can connect to a specific port on the switch by listing specific MAC addresses with the port.
Networking device that sends the packets to every one of its ports to ensure that it will reach its intended destination.
The goal of _____________ is to reduce the exposure of the organization to malicious code.
It's anything that can interrupt the operation, functioning, integrity, or availability of a network or system.
Adware is a type of malware that restricts user access to the computer either by encrypting files on the hard drive or locking down the system
Which of the following best describes an AV-pair?
True or False? ISE deployments must wait for Feed Service updates for new profiles.
It is an end-to-end layer used to deliver messages to a host
Which host mode will permit a virtually unlimited number of endpoints per port, allowing all subsequent MAC addresses to share the authorization result of the first endpoint authorized?
Which of the following best describes the difference between authentication and authorization?
Combination of brute force and dictionary attack.
Attack that send an email that contains attachment that loads malware onto your computer
SQL stands for?
This layer is also called human-computer interaction layer.
As a philosophy, it complements midpoint security, which focuses on individual devices; preventive security instead focuses on how those devices interact, and on the connective tissue between them.
It is an advanced method of error handling.
Name three ways in which an endpoint profile can be used in an authorization policy rule?
Which probe is used to trigger the SNMPQUERY probe to query a NAD?
It uses available resources, such as passwords or scripts.
An attack where the hacker mimics another employee in the company.
It is a security solution by organization to notice any malicious activity in a network.
After identifying problems quickly, you must respond to them and return to a safe state as rapidly as possible.
It has been developed by ISO in the year 1984.
It could be exploited because of an encryption key that was vulnerable to decoding.
What is the purpose of adding a user with the username radiustest password password command?
Which of the following are TACACS+ messages sent from the AAA client to the AAA server? (Select all that apply.)
Stephen Northcutt wrote an essay on the basics of network security for CS) online last year.
Based with SANS Technology Institute, it is the process of making preventative measures to keep the underlying networking infrastructure from any unauthorized access.
Bridge is a networking device used at network layer of the OSI reference model.
This attack tries to defeat an authentication mechanism by systematically entering each word in a dictionary as a password.
It is an advanced method of handling an error.
Which of the following technologies enables an administrator to maintain the same configuration on all access ports, on all switches, regardless of the type of device connecting to the network?
It has an additional ability where they can modify security settings of a software.
Which of the following are not part of OSI Layer?
It is a set of standards that are widely used as a basis for communication.
Which command on a Cisco switch will display the current status of the AAA server(s)?
The following are the goals of network security, EXCEPT;
“Imagine the status/service of a bank if its customers are unable to make transactions using their accounts “.This scenario refers to what goals of network security ……..
Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
CSMA/CD stands for ....
An abbreviation that is consider as the brains of the computer.
This is a device used to convert analog signal to digital and vice-versa.
It uses code to access operating systems and software.
Internet is an example of a network.
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks.
True or False? MSCHAPv2 may be used to perform machine authentication with an LDAP connection to Active Directory.
Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access.
Which of the following is true?
Availability refers to the ability of a network to protect its information from any unauthorized access.
worms, and trojans by definition attempt
This is a way of protecting a computer from intrusion through the ports.
Which of the following protocols is best suited for authenticating and authorizing a user for network access AAA?
It is a security concern because most scripting languages can make some alteration to your system.
The following codes is an example of?
It is the foundation for all security policies.
What determines when an endpoint is assigned to a profile?
It is a type of reporting method that is used to report critical events that typically require some form of actions from the system or network administrator.
What is a computer network?
You should configure your systems and networks as correctly as possible.
Large volume of data is also known as
This network configuration has a Star Topology.
it is a type of reports that is only used to notify the system administrator that there’s a change occurred in the system.
It means that the developer checks all the data to make sure that the information provided by the user in the application is valid and correct.
Which of the following are the commands for disabling a port in a Network Switch. Choose any that Apply
It is designed to appear as a legit program to gain access to a network.
To keep up this site, we need your assistance. A little gift will help us alot.
Donate- The more you give the more you receive.
Related SubjectProfessional Ethics in Information Technology
Security Analysis
Network Infrastructure and Directory Services
Data Communications and Networking 4
Information Assurance and Security 3
Mobile Application Design and Development 2
Object Oriented Programming Laboratory
Mobile Programming
Mobile Application Design and Development
Managing Information and Technology
Management Information Systems
Mail and Web Services
Living in the Information Technology Era
Information Technology Practicum
Information Technology Capstone Project
Introduction to Multimedia
Introduction to Information Systems
Introduction to Human Computer
Introduction to Computing
Intro to Hardware Description Language
Internet Technology in Real Estate
Internet Marketing and Entrepreneurship
Integrative Programming and Technology 2
Information Systems Operations and Maintenance
Information Security and Management
Information Assurance and Security 2
Fundamentals of Investigation and Intelligence
Fundamentals of Database System
Chemistry for Engineers
Digital Imaging
Database Management System
Data Structures and Algorithms
Data Communications and Networking 2
Data Communications and Networking
Cyber Security: Theories and Practice
Current Trends and Issues
Computer Programming
Computer Fundamentals
Software Engineering
Integrative Programming and Technology
Linux Administration
Applied Business Tools and Technologies
System Administration and Maintenance
Application Lifecycle Management
Systems Integration and Architecture
Information Assurance and Security
Principles of Operating System and its Application
Data Communications and Networking 3
Auditing and Assurance Concepts and Applications
Animation Project
3D Game Art Development
Load Testing
Shopee Helmet
Shopee 3D Floor
Lazada Smart TV Box
Our team has been certified on Ezoic the google award-winning platform for publishers.
We just wanted to take this opportunity to genuinely thank you for visiting with us and supporting our team hard work.