Question 6 of 134

Which three ESP fields can be encrypted during transmission? (Choose three.)

    Correct Answer: D, E, F

    The Encapsulating Security Payload (ESP) protocol offers data confidentiality, data integrity, and authentication. Within the ESP structure, the fields that can be encrypted during transmission include Padding, Pad Length, and Next Header. Padding is used to ensure that the plaintext ends on a correct byte boundary required by some encryption algorithms. The Pad Length field specifies how much of the payload is padding rather than actual data. The Next Header field identifies the type of data carried in the payload. These fields are all encrypted to maintain the confidentiality and integrity of the data being transmitted.

Question 7 of 134

What are two default Cisco IOS privilege levels? (Choose two.)

    Correct Answer: B, F

    Cisco IOS has two primary privilege levels by default: level 1 and level 15. Level 1, also known as user EXEC mode, provides basic operational commands for monitoring and troubleshooting. Level 15, also known as privileged EXEC mode, provides complete access to the device configuration and advanced troubleshooting commands. While there are 16 configurable levels (0-15), 1 and 15 are the two default levels.

Question 8 of 134

Which two authentication types does OSPF support? (Choose two.)

    Correct Answer: A, B

    OSPF supports two primary types of authentication: plaintext and MD5. Plaintext authentication uses simple clear-text passwords, while MD5 authentication uses cryptographic hashing to provide more secure authentication. These are the types referred to as Type 1 (plaintext) and Type 2 (MD5) in OSPF.

Question 9 of 134

Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)

    Correct Answer: A, B

    Control Plane Policing (CoPP) and Control Plane Protection (CPPr) use QoS (Quality of Service) and traffic classification to protect the control plane from unnecessary or malicious traffic. QoS ensures the control plane can handle high-priority traffic efficiently by prioritizing it over regular data traffic. Traffic classification allows the control plane to categorize incoming traffic and apply appropriate policies to manage and protect against harmful traffic.

Question 10 of 134

Which two statements about stateless firewalls are true? (Choose two.)

    Correct Answer: A, B

    Stateless firewalls compare the 5-tuple (source IP, destination IP, source port, destination port, and protocol) of each incoming packet against configurable rules to determine whether to permit or deny the packet, making statement A true. They also cannot track connections, meaning they do not maintain information about the state of network connections, which makes statement B true. These firewalls do not remember past traffic patterns, and their decisions are based solely on the current packet without considering its context in a sequence of packets.