A) Intrazone Permit
B) trust but verify
C) user-role firewall policies
D) Zero Trust
Correct Answer
verified
Multiple Choice
A) one-arm
B) two-arm
C) transparent
D) inline
Correct Answer
verified
Multiple Choice
A) BFD
B) OSPF
C) GRE
D) IPsec
Correct Answer
verified
Multiple Choice
A) Service chaining uses IPsec to connect together two or more VMs
B) Service chaining evaluates traffic by using multiple security features on the same instance
C) Service chaining redirects traffic back through the same device for additional processing
D) Service chaining combines multiple VNF instances together in the data flow
Correct Answer
verified
Multiple Choice
A) BGP
B) OSPF
C) FBF
D) ECMP
Correct Answer
verified
Multiple Choice
A) IPsec
B) 802.1X
C) NAT
D) ALGs
Correct Answer
verified
Multiple Choice
A) The supplicant is the device that prevents the authenticator's access until it is authenticated
B) The supplicant is the device that is being authenticated
C) The authenticator is the device that is being authenticated
D) The authenticator is the device that prevents the supplicant's access until it is authenticated
Correct Answer
verified
Multiple Choice
A) Multiple VLANs can be part of one security zone
B) A security zone is limited to a single VLAN
C) Inter-VLAN traffic within a zone can bypass firewall services
D) Inter-VLAN traffic is secured through firewall services
Correct Answer
verified
Multiple Choice
A) IDP
B) Sky ATP
C) JSA
D) JATP
Correct Answer
verified
Multiple Choice
A) 2
B) 4
C) 1
D) 3
Correct Answer
verified
Multiple Choice
A) BFD
B) OSPF
C) GRE
D) IPsec
Correct Answer
verified
Multiple Choice
A) SDSN
B) Stateful Firewall
C) Access Control
D) ALG
Correct Answer
verified
Multiple Choice
A) group VPN
B) AutoVPN
C) MPLS Layer 3 VPN
D) Auto Discovery VPN
Correct Answer
verified
Multiple Choice
A) firewall filters
B) intrusion prevention system
C) unified threat management
D) screens
Correct Answer
verified
Multiple Choice
A) IPsec
B) 802.1X
C) NAT
D) ALGs
Correct Answer
verified
Multiple Choice
A) Implement a certificate-based VPN using a public key infrastructure (PKI)
B) Modify your IKE proposals to use Diffie-Hellman group 14 or higher
C) Use firewall filters to block traffic from the stolen VPN router
D) Rotate VPN pre-shared keys every month
Correct Answer
verified
Multiple Choice
A) 2
B) 3
C) 4
D) 5
Correct Answer
verified
Multiple Choice
A) MACsec encryption
B) LAG Layer 2 hashing
C) IRB VLAN routing between hosts
D) stacked VLAN tagging on the core switches
Correct Answer
verified
Multiple Choice
A) firewall filters
B) intrusion prevention system
C) unified threat management
D) screens
Correct Answer
verified
Multiple Choice
A) Sky ATP SMTP scanning
B) Sky ATP HTTP scanning
C) SSL forward proxy
D) SSL reverse proxy
Correct Answer
verified
Showing 41 - 60 of 69
Related Exams