Anda di halaman 1dari 2

3. Cisco Best Practice – BOOT, TFTP, DNS 153.

Data Fidelity Technology – File Reputation


9. EAP Method – EAP-FAST 154. Feature Filter CoPP – Access Control List
11. Data Plane – ACL, Anti-Spoofing, DHCP 157. Attacker send mail – Phishing
14. Sensor Mode Attacker - IPS 160. malicious CEO – Target malware, Advance threat
15. SDEE Message - Error, All 163. EAP-FASTv2 over EAP-FAST – Single EAP exchange
15. Reflexive ACL – UDP, Ext IP, TCP 164. IOS privilege – below it
22. TACACS differ RADIUS – TCP, Sent NAS, Per-Command 165. Asymmetric Cryptography – Public, Private
24. Lab Group Policy – Default Radius Group 170. Device management task – SSH, SNMPv3
25. Lab ASA VPN – Clientless SSL VPN, Default Web VPN 172. Radius diff TACACS - fewer pkt, authentication pkt, UDP
26. Lab DfltGrpPolicy – ABCD 173. A data breath – Confidentiality
28. CIA Tried – Modify Data 175. Primary purposed IPS – Signature is Triggered
33. IPSec VPN – Security Associate, Mutual 176. PEAP – EAP – Encrypts exchange
38. IKE use NAT – UDP 4500 179. Proxy Firewall – Cross-site scripting
39. IPSec Transport - Between Stations, Unicast, Payload 180. DHCP spoofing – Modify, Man-In-Middle, Network G/W
41. IPSec VPN - isakmp sa 184. Block Malicious traffic – Allow with inspection
43. Stuxnet Virus – Cyber warfare 186. Dynamic PAT – Round Robin
49. FirePower preprocessor SYN – Rate-based Prevention 187. CEO Email Msg – Advance Threat, Targeted Malware
50. VPN Feature – Hairpinning 189. HTTP-GET – TCP, ACL, NAT
52. Cisco ACS – Scalability 191. Well known Security - Phishing, Ransomware
62. Local LAN/WAN – Split Tunneling 192. Non-malicious program – Host IPS
67. PVLAN Isolated Port – Promiscous Port 193. Internal IP Address – no proxy-run
70. Attacker Virtually change - MAC Spoofing 194. Traffic based IP Address - Reputation based
71. Next Generation Encryption – AES, SHA-384 197. Component of CIA – Integrity
74. CoPP and CPPr – QoS, Traffic Classification 203. PVLAN Communicate with all – Promiscuous Port
80. Host based IPS – Encrypted File, Restrictive Policy, Alert 204. Valid TCP connection – SYN-RCVD, Closed
83. Session Management - Route Lookup, NAT, ACL 208. Diffie-Hellman key – IKE
85. Cisco Hast Type – Md5 210. VPN tunnel establish - crypto ipsec sa
88. Cisco IPS manager – SDEE 213. OAKLEY and SKEME – IKE
90. HMAC use Authenticity – hash, key 214. key length represent - Number of permutation
92. Radius support Cisco ASA – PAP, MS-CHAPv1, MS-CHAPv2 216. Technology do apply integrity, confidentially – IPSec
97. Attack VLAN Hopping – Switch Spoofing, Double Tagging 222. PVLAN port allow same VLAN – Isolated PVLAN
100. FirePOWER impact flag – Severity of an attack 226. SYN flood attack – DoS
104. SMTP processor FirePOWER – Extranet & Decode email 228. Prevent the company data – Integrity
113. IPS type - Anomaly Based 230. Oakley cryptography – ISAKMP
114. Threat is the victim – Phishing 231. Cisco Web Reputation – outbreak filter, web reputation
115. Web Based Attacker - Web Security Appliance 238. Deny all Policy in ZBF – Same zone
116. Function of PVLAN – L2 Broadcast Domain 241. Stateful firewall – Connection created, state table
117. Spoofing Attack – Unicast reserve 245. Bidirectional traffic – Static NAT
118. CDP version 1 attack – DoS 247. BYOD arch – Identity Service, Prime Infrastructure
119. Mitigate CAM Overflow – Dynamic Port Security 250. TCP port 25 – ESA
121. ARP Spoofing Attack – DHCP Spoofing, Dynamic ARP 252. hacks the system with script – script kiddy
123. Attacker target Network – Reconnaissance 254. NAT (Inside, outside) – Dynamic PAT
124. Security Control defense – Treat mitigation 256. SIEM provide – multiple system, storage requirement
125. Cisco Configuration Enable AAA – AAA Summary 264. Config Cisco IOS – Select int/traffic, specify sign/conf.
126. SEIM Software – Altering Administer, Syslog Data 274. Well-known security terms – Phishing, ransomware
127. ASA handle the Packet – First matching class map 277. Technology that Provide data confidentiality – IPSec
128. Definition of Malware – Unwanted Software 283. Preventing the Modification of data – Integrity
129. Deny Attacker inline – IPS 284. RADIUS Protocol – Authentication and Authorization
131. FirePOWER SYN Attack – Rate-Based prevention 286. Host level IPS – Multi OS, offsite computer
133. Encrypted Technology – Software 288. Cisco IOS ZBF – Self Zone, Same Zone, Any Zone
134. Cisco Email Security – Contextual 291. App. layer firewall – DoS attack, Authenticate individual
135. Sourcefire secure – Allow with inspection 293. verify VPN connection – crypto ipsec sa
137. Wipe command ISE - Manage Corporate data 294. TACACS+ server authentication – ASCII, PAP, MS-CHAPv1
138. Digital Certificate – Central CA Server 295. IPS alert from Cisco ISR Router – SDEE, HTTPS
139. False Negative IPS – Penetration Testing 300. Cisco ISR Router – verify the digital signature
140. Stateless Firewall – 5 Tuple, Track Connection 302. AAA implement – VPN Connection, vty ports, TACACS
142. PVLAN Allow VLAN – Community host 306. TACACS protocol – separate AAA, encrypts the body
152. IPS Modes Maximum – Inline 307. Web Application firewall – block know vulnerabilities

Anda mungkin juga menyukai