from Tom's IT Pro
via CERTIVIEW
When an employee brings in their own PED to use on the company network, the process used to bring it into compliance with the BYOD policy is commonly known as?
A. Forensics
B. PTZ
C. On‐boarding
D. RTO
The correct answer is C.
A PED is a personal electronic device, which means anything portable such as a notebook, tablet or smart phone. The process used to bring it into compliance with the BYOD policy is commonly known as on-boarding.
Forensics is the process of gathering evidence. PTZ stands for pan, tilt, zoom and refers to the common remote control features of security cameras. RTO stands for recovery time objective, which is the amount of time allocated for a disaster recovery process in order to return an organization back to a functioning state.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.
There are quite a few built-in services that are a part of NSX that enhance security. More than just micro-segmentation, including — the distributed firewall, security groups, IPsec VPN, NSX edge firewall, data security, and server activity monitoring. Third-party services can also be integrated such as antivirus, intrusion prevention, vulnerability management, as well as identity and access management.
This post focuses on two features: the distributed firewall and security groups.
The distributed firewall is spread across ESXi hosts and is enforced as close to the virtual machine traffic source. The distributed firewall runs as a kernel service within ESXi, providing excellent throughput. By adding more ESXi hosts to a cluster, the distributed firewall throughput capacity increases.
The NSX distributed firewall can be used to enforce stateful firewall services for virtual machines, enforcing at the virtual machine’s vNIC. All inbound (after Virtual Extensible LAN [VXLAN] Tunnel Endpoint — also called VTEP — as well as de-encapsulation) and outbound (before VTEP encapsulation) can be inspected with firewall policies. NSX’s distributed firewall rules are based on Layer 2 through Layer 4.
Distributed firewall rules differ by the layer to which it corresponds:
With third-party integration, security features through Layer 7 may be implemented. These policies are created in vCenter Server using the vSphere Web Client.
Security groups can be extremely powerful when combined with a security policy or firewall rule. Security groups allow the grouping of an object collection within a vSphere inventory. After a security group is created, policies may be attached to it. One clever feature the ability to determine group membership by using several criteria. This criterion is determined by a set of conditions that must be matched; this can include guest operating system type, virtual machine name, computer name (in guest operating systems), security tag or entity. Additionally, exclusions may be set to ensure that certain inventory objects are not included in the group.
Firewall rules can be created as a part of the security policy applied to the virtual machines contained within the security group. The Service Composer components provisions and assigns network and security services to applications.
The VMware NSX platform changes the way networking and security services are provisioned. It allows greater visibility (including being able to determine the virtual machines’ names as well as their operating systems). This allows for more granular management and security, allowing (for example) — creating firewall rules at the vNIC level.
Combining this level of flexibility and functionality with the rest of VMware’s offerings, the NSX platform is a powerful aspect of the data center.
Which four features are provided by Cisco TelePresence Management Suite (TMS)? (Choose four.)
A. Scheduling of video conference calls
B. Built-in-bridge functionality for multiparty video conferences
C. SIP-H.323 protocol interworking
D. Centralized management of conference resources
E. SMTP email event notification
F. Endpoint configuration backup and restore
G. Cisco TelePresence endpoint automated redundancy
H. Automated resource optimization
Answer: A, D, E and F.
Per Cisco: Benefits of Cisco TMS include:
Features of Cisco TMS include:
Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0
Related Certification
CCNA Collaboration
Learn more about Cisco Collaboration training.
Which statement about the Layer 3 card on the Cisco Nexus 5500 Series Switch is true?
A. BGP is not supported, but RIP, EIGRP, and OSPF are supported.
B. Up to two 4-port cards are supported with Layer 3 forwarding capability.
C. Up to 16 FEX connections are supported.
D. Port channels cannot be configured as Layer 3 interfaces.
Answer: C.
Per the Cisco data sheet for the Nexus 5500:
Layer 3 interfaces: Routed ports on Cisco Nexus 5500 platform interfaces, switch virtual interface (SVI), PortChannels, subinterfaces and PortChannel subinterfaces for a total of 4096 entries.
Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0
Related Certification
CCNP Data Center
What is the primary distinction between a NoSQL database and a SQL database?
A. One supports structure query language expressions, while the other does not.
B. One handles structured data, while the other handles big data.
C. One is implemented using open source technologies, while the other uses commercial code.
D. One is useful for private networks, while the other is used only in the cloud.
The correct answer is B.
The primary distinction between a NoSQL database and a SQL database is that one handles structured data, while the other handles big data. In most cases, even NoSQL databases support structured query language (SQL) expressions. In fact, the term NoSQL is a bit disingenuous as it should be called Non-relational as the database is not a standard relational table but a collection of numerous heterogeneous data sets. NoSQL databases and SQL databases can be implemented with either open source or commercial code solutions. Also, neither is limited to private networks or cloud only.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
You want to configure a Cisco TelePresence SX endpoint to use static IP addressing for the TFTP server. Which path will you use to complete this configuration?
A. Network Services > Network 1 > DHCP RequestTFTPServerAddress> Off
B. Network > TFTP > DHCP RequestTFTPServerAddress> Off
C. Network Services > TFTP > DHCP RequestTFTPServerAddress> Off
D. Configuration > System Configuration > Provisioning > Set the External Manager Address
Answer: D.
To configure a static address for the TFTP server, navigate to Configuration > System Configuration > Provisioning > Set the External Manager Address.
Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0
Related Certification
CCNA Collaboration
Learn more about Cisco Collaboration training.
Which two statements about Cisco Nexus 7000 line cards are true? (Choose two.)
A. M1, M2 and F1 cards are allowed in the same VDC.
B. M1, M2 and F1 cards are not allowed in the same VDC.
C. F line cards are Layer 3 only.
D. M line cards support Layer 2, Layer 3 and Layer 4 with large forwarding tables and a rich feature set.
E. The F2 line card must reside in the admin VDC.
Answer: A and D.
Per Cisco data sheets for the Nexus 7000 series switches, the M1, M2 and F1 cards can coexist in the same virtual device context (VDC). The M series line cards are multilayer forwarding cards and with addition of the XL license, can accommodate a much larger layer 3 forwarding table (up to a million IPv4 routes).
Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0
Related Certification
CCNP Data Center
Which element of assessment or monitoring causes the security staff to discount the value of alarms?
A. False positives
B. Fuzzing
C. Excessive policy
D. Password cracking
The correct answer is A.
False positives is the element of assessment or monitoring causes the security staff to discount the value of alarms. A false positive is when a benign event triggers an alarm and thus, treats the event as potentially malicious.
Fuzzing is a testing process to locate flaws in code. An excessive policy is a security policy that allows everything (i.e. allow by default). Password cracking the process of reverse engineering a password hash in order to discover the original password.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Which three features does the Cisco Video Communication Server provide? (Choose three.)
A. Native Cisco SCCP integration
B. SIP-H.323 interworking functionality
C. Native scheduling
D. SIP trunk integration with Cisco Unified Communications Manager
E. Third-party standards-based H.323 and SIP device registration
F. Reverse proxy
Answer: B, D and E.
Per Cisco: Important use cases for Cisco VCS include:
When Cisco VCS is deployed with Cisco Unified Communications Manager or Cisco Business Edition 9.1.2 or later, the following is also possible when remote and mobile access to Cisco Unified Communications Manager is enabled:
Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0
Related Certification
CCNA Collaboration
Learn more about Cisco Collaboration training.
Which statement about scalability in OTV is true?
A. The control plane avoids flooding by passing MAC reachability information.
B. IP-based functionality provides Layer 3 extension over any transport.
C. Any encapsulation overhead is avoided by using IS-IS.
D. Unknown unicasts are handled by the authoritative edge device.
Answer: A.
OTV introduces the concept of “MAC routing,” which means a control plane protocol is used to exchange MAC reachability information between network devices, providing LAN extension functionality. IS-IS has been modified to supply that functionality for OTV.
Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0
Related Certification
CCNP Data Center
Kelly is a network security officer for a large state-run agency in California. Kelly is asked by the IT manager of another state agency to perform a security audit on their network. This audit she is asked to perform is an external audit. The IT manager thought that Kelly would be a great candidate for this task since she does not work for this other agency and is an accomplished IT auditor. The first task that she is asked to perform is an attempt to crack user passwords. Since Kelly knows that all state agency passwords must abide by the same password policy, she believes she can finish this particular task quickly.
What is the best password attack method for Kelly to use in this situation?
A. Kelly can produce the best and fastest results if she uses a dictionary attack.
B. A hyberfil-based password attack is the best method of password cracking in this scenario.
C. She should utilize the reverse-encryption password cracking technique since she knows the password policy.
D. Kelly should use a rule-based attack on the agency’s user passwords.
The correct answer is D.
This attack is used when the attacker or security auditor has some information about the password. This is more powerful attack than the dictionary and brute-force attacks, because the attacker or security auditor knows the password type. For example, if the attacker or security auditor knows that the password contains a two- or three-digit number, he or she will use some specific techniques to extract the password quickly.
Related Course
Certified Ethical Hacker v9