Network Device Security (ENCOR, CCNP Quiz)

Please enter your email:

Which type of Security architecture (security system) is this?

 
 
 
 

What are the individual entries in Access Control Lists called?

 
 
 
 

Phishing falls under which type of Security attacks?

 
 
 
 

Which type of ACL is this?

#access-list 1 deny   host 10.0.0.1
#access-list 1 permit 10.0.0.0 0.0.0.255
#access-list 1 permit 192.168.0.0 0.0.255.255

 
 
 
 

How can we best prevent Data Loss Layer2 attacks?

 
 
 
 

What will be the final result of this ACL:

#access-list 1 deny host 172.0.0.1
#access-list 1 permit host 172.0.0.1

 
 
 
 

Which of these is correct method to assign ACL to Telnet?

 
 
 
 

When implementing port security, which command allows pre-defined quantity of MAC addresses?

 
 
 
 

Which type of ACL is this?

#access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80
#access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443
#access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443

 
 
 
 

Which of these is correct method to assign an Access Control List to a physical interface?

 
 
 
 

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *