Tag Archives: attacks

An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute force attacks. Which two requirements should be included in this policy? (Choose two.)

A. active username limit B. password expiration period C. access code control D. username expiration date E. minimum password length Answer: Option B, E. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer is configuring a guest password policy and needs to ensure that the password complexity requirements are set to mitigate brute… Read More »

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

A. SHA-512 and SHA-384 B. MD5 algorithm-128 and SHA-384 C. SHA-1, SHA-256, and SHA-512 D. PBKDF2, BCrypt, and SCrypt Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which algorithms are used to secure REST API from brute attacks and minimize the impact? appeared first on Majanto.

An engineer must protect their company against ransomware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

A. Use Cisco Firepower and block traffic to TOR networks. B. Use Cisco AMP deployment with the Malicious Activity Protection engine enabled. C. Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation. D. Use Cisco AMP deployment with the Exploit Prevention engine enabled. Answer: Option B. Explanation:  No answer description available for this question Show… Read More »

An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?

A. AP mode: local, AP submode: none B. AP mode: monitor, AP submode: WIPS C. AP mode: monitor, AP submode: none D. AP mode: local, AP submode: WIPS Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and… Read More »

What is a practice that protects a network from VLAN hopping attacks?

A. Enable dynamic ARP inspection B. Configure an ACL to prevent traffic from changing VLANs C. Change native VLAN to an unused VLAN ID D. Implement port security on internet-facing VLANs Answer: Option C. Explanation:  No answer description available for this question. Show AnswerDiscussion The post What is a practice that protects a network from VLAN hopping attacks?… Read More »