What configure mode you used for the command ip ospf authentication-key?

What configure mode you used for the command ip ospf authentication-key (something) ? A. global B. priviliged C. in-line D. … Explanation:BDip ospf authentication-key is used under interface configuration mode, so it’s in interface level, under globalconfiguration mode. If it asks about interface level then choose that.interface Serial0ip address 192.16.64.1 255.255.255.0ip ospf authentication-key c1$c0 Show […]

Read More

SIEM Functions?

SIEM Functions (Choose two) A. correlation between logs and events from multiple sys B. event aggregation that allows reduced logs stogarge C. comined managemant access to firewalls D. … Explanation:BDSecurity Information Event Management SIEM+ Log collection of event records from sources throughout the organization provides important forensic toolsand helps to address compliance reporting requirements.+ Normalization […]

Read More

Characteristics of application layer firewall

Characteristics of application layer firewall (probably choose 2) A. supports revers proxy B. is immune to URL manupulation C. supprts multiple application D. provide statefull firewall security E. saves processing usage Explanation:Brad1. supports revers proxy – Definitely true2. is immune to URL manupulation – Definitely false3. supprts multiple application – Definitely true4. provide statefull firewall […]

Read More

All host connects to switch.

Regarding PVLAN diagram question:Switch was in VLAN 300Isolated Host 1 on VLAN 301Host 2 and Host 4 on VLAN 303 or something (Community PVLAN)Server is connected to Switch.All host connects to switch. A. Host 2 (Host is part of community PVLAN). B. Other devices on VLAN XXX (VLAN were isolated host is connected, in my […]

Read More

How to protect port TCP 25?

How to protect port TCP 25? Answer: ESA (Email Security Appliance) Explanation:User SK on securitytut.com is saying:Q) Which device do you use to protect port 25 traffic?a) ASAb) WLCc)xdxAnswer A Show Answer

Read More