Which command initializes a lawful intercept view?

Which command initializes a lawful intercept view?

Which command initializes a lawful intercept view?

A.
username cisco1 view lawful-intercept password cisco

B.
parser view cisco li-view

C.
li-view cisco user cisco1 password cisco

D.
parser view li-view inclusive

Explanation:
Before you initialize a lawful intercept view, ensure that the privilege level is set to 15 via the
privilege command.
SUMMARY STEPS
1. enable view
2. configure terminal
3. li-view li-password user username password password
4. username lawful-intercept [name] [privilege privilege-level| view view-name] password
password
5. parser view view-name
6. secret 5 encrypted-password
7. name new-name



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Johanna Konig

Johanna Konig

QUESTION
What is the most common Cisco Discovery Protocol version 1 attack?

A. Denial of Service
B. MAC-address spoofing
C. CAM-table overflow
D. VLAN hopping

Answer: A

QUESTION
What is the Cisco preferred countermeasure to mitigate CAM overflows?

A. Port security
B. Dynamic port security
C. IP source guard
D. Root guard

Answer: B

QUESTION
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?

A. STP elects the root bridge
B. STP selects the root port
C. STP selects the designated port
D. STP blocks one of the ports

Answer: A

QUESTION
Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)

A. Port security
B. DHCP snooping
C. IP source guard
D. Dynamic ARP inspection

Answer: BD

QUESTION
Which of the following statements about access lists are true? (Choose three.)

A. Extended access lists should be placed as near as possible to the destination
B. Extended access lists should be placed as near as possible to the source
C. Standard access lists should be placed as near as possible to the destination
D. Standard access lists should be placed as near as possible to the source
E. Standard access lists filter on the source address
F. Standard access lists filter on the destination address

Answer: BCE

QUESTION
In which stage of an attack does the attacker discover devices on a target network?

A. Reconnaissance
B. Covering tracks
C. Gaining access
D. Maintaining access

Answer: A

QUESTION
Which type of security control is defense in depth?

A. Threat mitigation
B. Risk analysis
C. Botnet mitigation
D. Overt and covert channels

Answer: A

QUESTION
On which Cisco Configuration Professional screen do you enable AAA?

A. AAA Summary
B. AAA Servers and Groups
C. Authentication Policies
D. Authorization Policies

Answer: A

QUESTION
Which three statements about Cisco host-based IPS solution are true? (Choose three)

A. It work with deployed firewalls.
B. It can be deployed at the perimeter
C. It uses signature-based policies
D. It can have more restrictive policies than network-based IPS
E. It can generate alerts based on behavior at the desktop level
F. It can view encrypted files

Answer: DEF
Explanation:
The key word here is ‘Cisco’, and Cisco’s host-based IPS, CSA, is NOT signature-based and CAN view encrypted files.

QUESTION
What are two users of SIEM software? (Choose two)

A. performing automatic network audits
B. configuring firewall and IDS devices
C. alerting administrators to security events in real time
D. scanning emails for suspicious attachments
E. collecting and archiving syslog data

Answer: CE
Explanation:
The other choices are not functions of SIEM software.

QUESTION
If a packet matches more than one class map in an individual feature type’s policy map, how does the ASA handle the packet?

A. the ASA will apply the actions from only the last matching class maps it finds for the feature type.
B. the ASA will apply the actions from all matching class maps it finds for the feature type.
C. the ASA will apply the actions from only the most specific matching class map it finds for the feature type.
D. the ASA will apply the actions from only the first matching class maps it finds for the feature type

Answer: D
Explanation:
If it matches a class map for a given feature type, it will NOT attempt to match to any subsequent class maps.

QUESTION
What statement provides the best definition of malware?

A. Malware is tools and applications that remove unwanted programs.
B. Malware is a software used by nation states to commit cyber-crimes.
C. Malware is unwanted software that is harmful or destructive
D. Malware is a collection of worms, viruses and Trojan horses that is distributed as a single…..

Answer: C

QUESTION
Your security team has discovered a malicious program that has been harvesting the CEO’s email messages and the company’s user database for the last 6 months.
What are two possible types of attacks your team discovered?

A. social activism
B. advanced persistent threat
C. drive-by spyware
D. targeted malware

Answer: B
Explanation:
If required 2 answers in the real exam, please choose BD.

Full Version: https://www.braindump2go.com/210-260.html