Tag Archives: protect

Which three guidelines are used to protect confidential information? (Choose three.)

Which three guidelines are used to protect confidential information? (Choose three.) A. Treat user input as normal information. B. Encapsulate confidential information. C. Validate input before storing confidential information. D. Limit access to objects holding confidential information. E. Transparently handle information to improve diagnostics. F. Manage confidential and other information uniformly. G. Clearly identify and label confidential information.… Read More »

Which three guidelines are used to protect confidential information? (Choose three.)

Which three guidelines are used to protect confidential information? (Choose three.) A. Validate input before storing confidential information. B. Manage confidential and other information uniformly. C. Encapsulate confidential information. D. Limit access to objects holding confidential information. E. Clearly identify and label confidential information. F. Treat user input as normal information. G. Transparently handle information to improve diagnostics.… Read More »

Which three guidelines are used to protect confidential information? (Choose three.)

Which three guidelines are used to protect confidential information? (Choose three.) A. Encapsulate confidential information. B. Clearly identify and label confidential information. C. Manage confidential and other information uniformly. D. Validate input before storing confidential information. E. Transparently handle information to improve diagnostics. F. Limit access to objects holding confidential information. G. Treat user input as normal information.… Read More »

Which capability can be used to protect against unexpected hardware or power supply failures within an

Which capability can be used to protect against unexpected hardware or power supply failures within an availability domain? A. Fault Domains B. Compartments C. Top of Rack Switches D. Power Distribution Units Correct Answer: A A fault domain is a grouping of hardware and infrastructure within an availability domain. Each availability domain contains three fault domains. Fault domains… Read More »

An engineer configured R6 as the headend LSR of an RSVP-TE LSP to router XR2, with the dynamic path signaled as R6-R2-R5-XR2. and set the OSPF cost of all links to 1. MPLS autotunnel backup Is enabled on all routers to protect the LSP. Which two NNHOP backup tunnels should the engineer use to complete the implementation? (Choose two.)

Refer to the exhibit. An engineer configured R6 as the headend LSR of an RSVP-TE LSP to router XR2, with the dynamic path signaled as R6-R2-R5-XR2. and set the OSPF cost of all links to 1. MPLS autotunnel backup Is enabled on all routers to protect the LSP. Which two NNHOP backup tunnels should the engineer use to… Read More »

An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two.)

Refer to the exhibit. An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two.) A. R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 32 conform-action transmit exceed-action drop violate-action transmit B. R1(config)#policy-map POLICY-CoPP R1(config-pmap)#class CLASS-CoPP-Management… Read More »

An engineer must protect their company against ransomware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

A. Use Cisco Firepower and block traffic to TOR networks. B. Use Cisco AMP deployment with the Malicious Activity Protection engine enabled. C. Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation. D. Use Cisco AMP deployment with the Exploit Prevention engine enabled. Answer: Option B. Explanation:  No answer description available for this question Show… Read More »

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two.)

A. Configure the ports as trunk ports. B. Enable the Cisco Discovery Protocol. C. Configure the port type as access and place in VLAN 99. D. Administratively shut down the ports. E. Configure the ports in an EtherChannel. Answer: Option C, D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An engineer is asked… Read More »