⟩ _______ intrusion-detection systems learn the behavior of a machine or network, and create a baseline. A. Behavioral analysis B. Statistical anomaly C. Network D. Pattern matching E. Host
B. Statistical anomaly
B. Statistical anomaly
Explain Which Cisco IOS command enables the AAA access-control commands and functions on the router, and overrides the older TACACS and extended TACACS commands? A. no aaa authentication login default enable B. aaa authentication login default local C. aaa new-model D. login authentication default E. no login authentication default
Explain Which command globally disables CDP? A. no dcp B. cdp disable C. no cdp enable D. no cdp run
Explain Which administrative access mode for the Cisco PIX Security Appliance allows you to view a restricted and limited view of current settings? A. unprivileged mode B. privileged mode C. configuration mode D. monitor mode
Explain Wireless Local Area Networks are implemented as an extension to a) WAN b) LAN c) (a) & (b) d) None of the above
Explain Who is ultimately responsible for the internal control system? a) Chief Executive Officer b) Chief Financial Officer c) General Manager d) Every employee of the company e) None of the above
Explain When Cisco routers are configured for SSH, how do they act? A. as SSH servers B. as SSH clients C. as SSH and SSL servers D. as SSH and SSL clients E. as SSH accelerators F. as SsH proxies
Explain Which command is used to encrypt passwords in the router configuration file? A. service password-encryption B. password-encryption C. enable password encryption D. encrypt password
Suppose Lisa has programmed her companys router to recognize several internal networks. Which job title best describes her responsibilities? A. Network engineer B. Security manager C. Server administrator D. Help desk technician
Explain In XHTML, what is one of the functions of the <input> tag? A. To create a data cell in a table B. To create a check box in a form C. To create a record in a database D. To create a scrolling select list in a form
Explain Which protocol is used to transmit files across the Web to be rendered by a Web browser? A. Internet Protocol (IP) B. Hypertext Transfer Protocol (HTTP) C. Transmission Control Protocol (TCP) D. Point-to-Point Tunneling Protocol (PPTP)