89%(97)86 out of 97 people found this document helpful
This preview shows page 1 - 3 out of 6 pages.
1. (TCO A) _____ is malware that executes unexpected or unauthorized actions.(Points : 5)PhishingA smurf attackA Trojan horseA botnet attack Question 2.2. (TCO A) A man-in-the-middle attack is best mitigated by _____.(Points : 5)RFC 2082 ACLVPNRFC 2827 ACLARP/RARP Question 3.3. (TCO B) Which is the most appropriate choice for an enterprise network firewall?(Points : 5)Host-based firewallSoftware firewallPerimeter firewallClient firewall Question 4.4. (TCO B) This firewall action only applies to TCP sessions; it does not support UDP sessions in which inbound TCP traffic is limited to return traffic from TCP sessions initiated from the inside of the network.(Points : 5)Timed ACLsEstablished ACLsReflexive ACLsContext-based access control
Question 5.5. (TCO C) When a remote user attempts to dial in to the network, the network access server(NAS) queries the TACACS+ server. If the message sent to the server is REJECT, this means _____.(Points : 5)the user has not entered the correct username and passwordthe user is prompted to retrythe user is authenticated but not authorizedthe user is authorized but not authenticated Question 6.6. (TCO C) Which protocols would be most suited for AAA on non-Cisco and Cisco equipment networks?(Points : 5)RADIUS and UDPTACACS+ and UDPTACACS+ and TCPRADIUS and TCP 1. (TCO A) Create an example of how to mitigate a technological weakness, and an example of how to mitigate a security policy weakness. Create your own examples rather than using the course material’s examples.(Points : 15)There are some of the configuration related weaknesses and also need to be evidence by network configuration of the network related servers, switches and routers that reduce the security of the network. For examples include leaving unused ports open on a server, perimeter router ACL configurations that do not mitigate common network related attack problematic scenarios and allowing clear-text of Telnet access to routers.