#1. Which two services define cloud networks? (Choose two.)
#2. In which two situations should you use out-of-band management? (Choose two.)
#3. In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
#4. According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)
#5. Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
#6. Which three ESP fields can be encrypted during transmission? (Choose three.)
#7. What are two default Cisco IOS privilege levels? (Choose two.)
#8. Which two authentication types does OSPF support? (Choose two.)
#9. Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)
#10. Which two statements about stateless firewalls are true? (Choose two.)
#11. Which three statements about Cisco host-based IPS solutions are true? (Choose three.)
#12. What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
#13. Which tool can an attacker use to attempt a DDoS attack?
#14. What type of security support is provided by the Open Web Application Security Project?
#15. What type of attack was the Stuxnet virus?
#16. When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
#17. What is an advantage of implementing a Trusted Platform Module for disk encryption?
#18. In a security context, which action can you take to address compliance?
#19. Which type of secure connectivity does an extranet provide?
#20. What is the purpose of the Integrity component of the CIA triad?