Which three ESP fields can be encrypted during transmission? (Choose three.)
Which three ESP fields can be encrypted during transmission? (Choose three.)
The Encapsulating Security Payload (ESP) protocol offers data confidentiality, data integrity, and authentication. Within the ESP structure, the fields that can be encrypted during transmission include Padding, Pad Length, and Next Header. Padding is used to ensure that the plaintext ends on a correct byte boundary required by some encryption algorithms. The Pad Length field specifies how much of the payload is padding rather than actual data. The Next Header field identifies the type of data carried in the payload. These fields are all encrypted to maintain the confidentiality and integrity of the data being transmitted.
What are two default Cisco IOS privilege levels? (Choose two.)
Cisco IOS has two primary privilege levels by default: level 1 and level 15. Level 1, also known as user EXEC mode, provides basic operational commands for monitoring and troubleshooting. Level 15, also known as privileged EXEC mode, provides complete access to the device configuration and advanced troubleshooting commands. While there are 16 configurable levels (0-15), 1 and 15 are the two default levels.
Which two authentication types does OSPF support? (Choose two.)
OSPF supports two primary types of authentication: plaintext and MD5. Plaintext authentication uses simple clear-text passwords, while MD5 authentication uses cryptographic hashing to provide more secure authentication. These are the types referred to as Type 1 (plaintext) and Type 2 (MD5) in OSPF.
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)
Control Plane Policing (CoPP) and Control Plane Protection (CPPr) use QoS (Quality of Service) and traffic classification to protect the control plane from unnecessary or malicious traffic. QoS ensures the control plane can handle high-priority traffic efficiently by prioritizing it over regular data traffic. Traffic classification allows the control plane to categorize incoming traffic and apply appropriate policies to manage and protect against harmful traffic.
Which two statements about stateless firewalls are true? (Choose two.)
Stateless firewalls compare the 5-tuple (source IP, destination IP, source port, destination port, and protocol) of each incoming packet against configurable rules to determine whether to permit or deny the packet, making statement A true. They also cannot track connections, meaning they do not maintain information about the state of network connections, which makes statement B true. These firewalls do not remember past traffic patterns, and their decisions are based solely on the current packet without considering its context in a sequence of packets.