MOST TESTED REAL EXAM QUESTIONS AND VERIFIED
SOLUTIONS | GET IT 100% ACCURATE!! ALREADY
GRADED A+ | NEWEST EXAM | JUST RELEASED!!
Which functionality can be used to force alignment of visible
"from" in emails?
A) Domain-based Message Authentication, Reporting, and
Compliance
(DMARC)
B) DomainKeys Identified Mail (DKIM)
C) Sender Policy Framework (SPF)
D) Bayesian Filter - ANSWER-A) Domain-based Message
Authentication,
Reporting, and Compliance (DMARC)
Which step is commonly missed by organizations when
implementing network
segmentation?
A) Segmentation must include disabling IPv6 link-local
addresses.
B) Segmentation must include authentication and access
control per user/device.
C) Segmentation must eliminate VLAN trunk ports.
,D) Segmentation must utilize application-aware (layer 7)
filtering. - ANSWER-B) Segmentation must include
authentication and access control per user/device.
Why is blocking malicious IPv6 source hosts by their IPv6
address typically
ineffective?
A) The default IPv6 temporary address default lifetime for
most operating systems is 7 days.
B) The default IPv6 not-temporary address preferred lifetime
for most operating systems is 1 day.
C) The default IPv6 not-temporary address default lifetime for
most operating systems is 7 days.
D) The default IPv6 temporary address preferred lifetime for
most operating systems is 1 day. - ANSWER-D) The default
IPv6 temporary address preferred lifetime for most operating
systems is 1 day.
What functionality uses digital signatures to send an email
that guarantees it
originates from the owner of a
domain?
A) DNS filtering
B) Bayesian filter
C) DomainKeys Identified Mail
D) Sender Policy Framework - ANSWER-C) DomainKeys
Identified Mail
,An organization requires SNMP monitoring of Cisco network
devices; however, it does not have SNMPv3 capability. Which
of the following will prevent an attacker from gaining SNMP
access that enables them to download the Cisco IOS
configuration.
A) Disabling SNMP read access
B) Changing community strings frequently
C) Disabling SNMP write access
D) Using complex community strings - ANSWER-C) Disabling
SNMP write access
What is the default password type supported in Cisco devices?
A) Type 8
(PBKDF2)
B) Type 5 (salted
MD5)
C) Type 9
(SCRYPT)
D) Type 0 (plaintext) - ANSWER-D) Type 0
(plaintext)
What is an inherent security benefit of having system services
listening only on unique local address (ULA) IPv6 addresses
instead of global unicast addresses (GUA)?
, A) ULA addresses are used to fully anonymize the source,
thus improving privacy.
B) ULA addresses are not publicly routed, creating a layer of
isolation from the Internet.
C) ULA addresses do not offer an inherent security
improvement over GUA addresses.
D) ULA addresses are used to fully anonymize the
destination, this improving privacy. - ANSWER-B) ULA
addresses are not publicly routed, creating a layer of isolation
from the Internet.
Which of the following NIST special publications brings
guidelines for the secure
development of
IPv6?
A) NIST SP 800-119
B) NIST SP 800-53
C) NIST SP 800-86
D) NIST SP 800-68 - ANSWER-A) NIST SP 800-119
In which scenario must IPv6 hosts use duplicate address
detection (DAD) to
determine whether an address is already in use on
the network?
A) When systems use DHCPv6 to obtain an address and
stateless address autoconfiguration is enabled.