Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following commands in MQC tool matches IPv4 and IPv6 packets when IP parameter is missing?

A.

Match cos

B.

Match access-group

C.

Match IP precedence

D.

Match fr-dlci

Which of the following Linux file systems is a journaled file system?

A.

ext3

B.

ext2

C.

ext

D.

ext4

Which of the following can be used in an extended access list to filter traffic?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Destination MAC address

B.

Source IP address

C.

Protocol

D.

Destination IP address

E.

TCP or UDP port number

Which of the following tools detects certain types of packet filters and NAT setups?

A.

TShark

B.

Vulnerability scanner

C.

Wireshark

D.

Passive OS fingerprinting

You work as a Network Administrator for a bank. For securing the bank's network, you configure a firewall and an IDS. In spite of these security measures, intruders are able to attack the network.

After a close investigation, you find that your IDS is not configured properly and hence is unable to generate alarms when needed. What type of response is the IDS giving?

A.

False Negative

B.

True Negative

C.

True Positive

D.

False Positive

Which of the following statements about Access control list (ACL) is true?

Each correct answer represents a complete solution. Choose three.

A.

Extended IP Access Control List permits or denies packets only from a specific source IP addresses.

B.

Standard IP Access Control List permits or denies packets only from specific source IP addr esses.

C.

Standard IP Access Control List can be used to permit or deny traffic from a specific source IP addresses or for a specific destination IP address, and port.

D.

Extended IP Access Control List permits or denies traffic from a specific source IP addresses or for a specific destination IP address, and port.

E.

Access control list filters packets or network traffic by controlling whether routed packets are forwarded or blocked at the router's interfaces.

Which of the following is the module of OpenSER?

A.

Sipsak

B.

TShark

C.

WireShark

D.

SipTrace

Choose the best explanation for the resulting error when entering the command below.

A.

The command is attempting to create a standard access list with extended access list param eters.

B.

The ACL commands should be entered from the (config-router) configuration mode.

C.

The wildcard mask is not provided for the source and destination addresses.

D.

The port number given does not correspond with the proper transport protocol.

Which of the following can be used to mitigate the evil twin phishing attack?

A.

Magic Lantern

B.

IPSec VPN

C.

Obiwan

D.

SARA

Which of the following types of IP actions are supported by an IDP rulebase?

A.

Initiate rules of the rulebase

B.

Drop/block session

C.

Close connection

D.

Notify