0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
Which class of Cisco Common Classification Policy Language (C3PL) filters out the traffic that needs to be inspected?
Question 2 of 50
1 point(s)
Which class of Cisco Common Classification Policy Language (C3PL) inspects (Stateful inspection of traffic), permit (permit the traffic but no Stateful inspection), drop the traffic or generate log of it?
Question 3 of 50
1 point(s)
Which of the following two actions can be applied to a traffic class when a Cisco IOS Zone-Based Policy Firewall is being configured? (Choose any three)
Question 4 of 50
1 point(s)
Which of the followings are the techniques of accessing firewall for management? (Choose any three)
Question 5 of 50
1 point(s)
Which of the following actions in a Cisco IOS Zone-Based Policy Firewall is similar to a permit statement in an ACL?
Question 6 of 50
1 point(s)
In a Cisco IOS Zone-Based Policy Firewall, what is the main function of the permit or pass action?
Question 7 of 50
1 point(s)
In which mode of firewall deployment does ASA work as layer 2 bridge and traffic flows through it without adding itself as routing hop between communicating peers?
Question 8 of 50
1 point(s)
Which two of the followings are the modes of ASA deployment?
Question 9 of 50
1 point(s)
In which method of High availability does one device act as primary firewall or active firewall while the second stay in standby mode?
Question 10 of 50
1 point(s)
The concept of implementing multiple virtual firewalls is known as ____________.
Question 11 of 50
1 point(s)
Security level 100-is the highest possible and most trusted level. By default, on which of the following interface it is used?
Question 12 of 50
1 point(s)
Which policy specifies the rules for the data traffic inbound or outbound passing through an interface?
Question 13 of 50
1 point(s)
Which of the following algorithm can ensure data confidentiality?
Question 14 of 50
1 point(s)
Why is asymmetric algorithm key management simpler than symmetric algorithm key management?
Question 15 of 50
1 point(s)
Data Encryption Standard (DES) uses ________ bits for data encryption
Question 16 of 50
1 point(s)
Which of the following attacks exploits the weakness of any software that are unknown to the software vendor/developer?
Question 17 of 50
1 point(s)
What are the two common characteristics of the IDS and the IPS? (Choose any two)
Question 18 of 50
1 point(s)
Which of the followings are two limitations of an IDS? (Choose any two)
Question 19 of 50
1 point(s)
Where can an IDS/IPS be placed?
Question 20 of 50
1 point(s)
Which of the followings is the limitation of network-based IPS as compared to host-based IPS?
Question 21 of 50
1 point(s)
In which of the following terminologies is a sensor that generates an alert about the traffic, which is not malicious, but requires serious attention as long as security is concerned?
Question 22 of 50
1 point(s)
In which of the following terminologies is a malicious activity that is detected by the IPS module or sensor and for which an alert will be generated?
Question 23 of 50
1 point(s)
Which one of the followings is the characteristic of Reputation Based IDS/IPS?
Question 24 of 50
1 point(s)
Which of the following actions or responses are commonly used in IDS technology? (Choose any two)
Question 25 of 50
1 point(s)
Which of the following actions define actions or responses that are commonly used in IPS technology?
Question 26 of 50
1 point(s)
Which of the following micro-engines designs a signature to analyze a single packet instead of stream of packets?
Question 27 of 50
1 point(s)
Which of the followings is a part of digital signature and determines the critical level of an attack?
Question 28 of 50
1 point(s)
What is a disadvantage of a pattern-based detection mechanism?
Question 29 of 50
1 point(s)
Which of the following features of an IPS provides regular threat updates from the Cisco Network database?
Question 30 of 50
1 point(s)
In which mode of deployment will a copy of every data packet be sent to the sensor to analyze if there is any malicious activity?
Question 31 of 50
1 point(s)
In which of the following configured modes will the whole IP traffic be dropped, in case of sensor failure?
Question 32 of 50
1 point(s)
Which of the following options helps you to create a blacklist, with the help of Cisco Collective Security Intelligence Team “Talos”?
Question 33 of 50
1 point(s)
The technique in which you allow or permit IP address or traffic of your own choice is referred to as ______________.
Question 34 of 50
1 point(s)
Which of the followings is a limitation of an IPS?
Question 35 of 50
1 point(s)
Which of the following techniques does IPS provide for network protection by preventing an attack to reach its destination?
Question 36 of 50
1 point(s)
Which of the followings are E-mail based threats?
Question 37 of 50
1 point(s)
Which of the following attacks tries to get login credentials by manipulating the end-user by presenting different links, which look legitimate?
Question 38 of 50
1 point(s)
Which of the followings are the features of Cisco’s E-mail Security Appliance (ESA)? (Choose any three)
Question 39 of 50
1 point(s)
Which of the followings is a feature of Anti-malware Protection Security Solution?
Question 40 of 50
1 point(s)
Which of the following features of Anti-malware protection analyzes file’s behavior to determine the threat level and then updates the treat and its mitigations globally?
Question 41 of 50
1 point(s)
Which of the followings is a type of spam filtering that identifies spam messages without blocking the legitimate E-mail?
Question 42 of 50
1 point(s)
Which of the followings provides continuous analysis of data to detect, analyze, track, confirm and mitigate threats before, during and after an attack?
Question 43 of 50
1 point(s)
Which of the followings is a characteristic of the Data Loss Prevention (DLP)?
Question 44 of 50
1 point(s)
Which of the followings is the most widely used E-mail encryption standard?
Question 45 of 50
1 point(s)
Which of the followings controls the user access to specific website category?
Question 46 of 50
1 point(s)
Which of the followings protects your web or mobile applications from being compromised and prevents data from breaching?
Question 47 of 50
1 point(s)
What purposes does SSL/TLS decryption serve? (Choose any three)
Question 48 of 50
1 point(s)
Which of the followings are the mitigation techniques of Web based threats? (Choose any three)
Question 49 of 50
1 point(s)
Which of the following ASA series is suitable for small to medium sized enterprise environment?
Question 50 of 50
1 point(s)
Which of the followings is a web based attack?