Network Security FAQ: Cryptography Q1. How many possible keys are there for an 8-bit key? a. 8 b. 82 c. 28 d. 65,536 Answer: c. There are 8 bits in that key, and all those bits can have two different values. To calculate the possible keys, multiply 2 by 2 by 2one time for every bit, or 28. Q2. Which type of cipher typically acts on small units of data? a. Block … [Read more...]
CCNA Security FAQ: Network Insecurity
CCNA Security FAQ: Network Insecurity Q1. Which of the following constitutes the elements in the C-I-A triad? A. Consolidation, Integration, Authentication B. Confidentiality, Integrity, Availability C. Confusion, Impact, Animosity D. Central, Intelligence, Agency E. None of the above. Answer: B is the correct answer. This is pretty much industry-wide Q2. Cisco says … [Read more...]
Network Security FAQ: Understanding Defenses
Network Security FAQ: Understanding Defenses Q1. Standards for digital IDs and certificates are defined in which of the following documents? a. RFC 509 b. CCITT X.509 c. RFC 905 d. CCITT X.905 Answer: b. The International Telecommunications Union (ITU-T), formerly known as CCITT, provides the CCITT X.509 standard for certificates. Q2. List four parameters of a digital … [Read more...]
Network Security FAQ: Logging and Auditing
Network Security FAQ: Logging and Auditing Q1. List the various destinations to which the logging process can send logging messages. Answer: The logging process can send logging messages to the following destinations: Logging buffer Terminal lines SYSLOG server Console port Q2. What is SYSLOG? Answer: SYSLOG is a widely used protocol that can be used … [Read more...]
CCNP Security VPN FAQ: Configuring Cisco VPN 3000 for Remote Access Using Preshared Keys
CCNP Security VPN FAQ: Configuring Cisco VPN 3000 for Remote Access Using Preshared Keys Question. What methods can you use for user authentication on the Cisco VPN 3000 Series Concentrators? Answer: You can configure the VPN concentrators to use RADIUS, NT Domain, Security Dynamics International (SDI), and internal user authentication. Question. What methods can you use … [Read more...]
CCNP Secure IPS FAQ: Sensor Tuning
CCNP Secure IPS FAQ: Sensor Tuning Q1. Which of the following is not an example of an IDS evasion technique? A. Sending overlapping fragments B. Generating a flood of alarms C. Manipulating packet TTL values D. Sending attack traffic in an SSH session E. Sending attack traffic in a Telnet session Answer: E Q2. Which of the following is not an obfuscation method? A. … [Read more...]
CCNP Secure IPS FAQ: Advanced Signature Configuration
CCNP Secure IPS FAQ: Advanced Signature Configuration Q1. Which signature field indicates the likelihood that the signature will trigger on attack traffic? A. Alert Severity B. Signature Fidelity Rating C. Target Value Rating D. Event Action Override E. Alert Notes Answer: B Q2. Which of the following is not a valid value for the Event Count Key field? A. Attacker … [Read more...]
CCNP Security VPN FAQ: Cisco VPN 3000 LAN-to-LAN with Preshared Keys
CCNP Security VPN FAQ: Cisco VPN 3000 LAN-to-LAN with Preshared Keys Q1. What is a LAN-to-LAN connection? Answer: A LAN-to-LAN connection is a secure connection between two LANs. Q2. What equipment is required for a LAN-to-LAN connection? Answer: A LAN-to-LAN connection requires any combination of concentrators, routers and firewalls. Q3. Where can a LAN-to-LAN … [Read more...]
CCNP Security VPN FAQ: Configuring Scalability Features of the VPN 3002 Hardware Client
CCNP Security VPN FAQ: Configuring Scalability Features of the VPN 3002 Hardware Client Q1. What are the ramifications an administrator should consider when planning to use Virtual Router Redundancy Protocol (VRRP) along with reverse route injection (RRI)? Answer: VRRP (Virtual Router Redundancy Protocol) and RRI (Reverse Route Injection) are incompatible and should not be … [Read more...]
CCNP Security VPN FAQ: Cisco VPN 3000 Concentrator Series Hardware Overview
CCNP Security VPN FAQ: Cisco VPN 3000 Concentrator Series Hardware Overview Question. What models are available in the Cisco VPN 3000 Concentrator Series? Answer: Five models are available in the Cisco VPN 3000 Concentrator Series: VPN 3005, VPN 3015, VPN 3030, VPN 3060, and VPN 3080. Question. What is the maximum number of simultaneous sessions that can be supported on … [Read more...]