Network Device Security (ENCOR, CCNP Quiz)

Please enter your email:

What will be the final result of this ACL:

#access-list 1 deny host 172.0.0.1
#access-list 1 permit host 172.0.0.1

 
 
 
 

Phishing falls under which type of Security attacks?

 
 
 
 

Which of these is correct method to assign ACL to Telnet?

 
 
 
 

Which type of ACL is this?

#access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80
#access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443
#access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443

 
 
 
 

What are the individual entries in Access Control Lists called?

 
 
 
 

How can we best prevent Data Loss Layer2 attacks?

 
 
 
 

Which of these is correct method to assign an Access Control List to a physical interface?

 
 
 
 

When implementing port security, which command allows pre-defined quantity of MAC addresses?

 
 
 
 

Which type of ACL is this?

#access-list 1 deny   host 10.0.0.1
#access-list 1 permit 10.0.0.0 0.0.0.255
#access-list 1 permit 192.168.0.0 0.0.255.255

 
 
 
 

Which type of Security architecture (security system) is this?

 
 
 
 

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *