CCIE Security Practice Exam 2 Which of the following will be added to password stored in MD5 to make it more secure? Cryptotext Chipertext Rainbow Table Salt Which of the following is the potential security weakness of a traditional state full firewall? It cannot support UDP flows It works only in promiscuous mode It cannot detect application-layer attacks. All of the above What will be the result come when securing the Cisco IOS image using the Cisco IOS image resilience feature? The Cisco IOS image file will not be visible in the output from the #show flash command. The running Cisco IOS image will be encrypted and then automatically backed up to a TFTP server Both 1,2 None Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX is ________. File system interceptor Configuration interceptor Execution space interceptor None Where is the inspection policy applied with Cisco IOS Zone Based Policy Firewall? To the interface To the zone To the zone pair None Influencing will provide users personal information over the routers True False Which of the following kind of table do most firewall used today to keep track on the connection through the firewall? Netflow Express forwarding State Queuing Which of the following will be disabled as a result of the no service password recovery command? ROMMON password encryption service changes to the config-register setting None of the above Which of the following method can be used by hacker? privilege escalation attack social engineering attack Trojan horse attack All of the above The secure boot config global configuration takes a snapshot of the router running configuration and securely archives it in persistent storage. True False Loading … Question 1 of 10