DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
brute-force attack involves using trial and error
to crack passwords.
3. A. Penetration (pen) testing is commonly used to
find weak spots.
4. B. Nmap is the Network Mapper tool, which is
used for network discovery and security auditing.
5. B. MFA uses at least two identity components to
authenticate a user’s identity.
6. A, C. A one-way hash is used for fingerprinting
data.
7. A. Data needs to be secured in multiple locations:
while it is in motion (network), at rest (storage),
and while in use (memory).
8. B. An IDS is passive, as it receives a copy of a
packet, whereas an IPS is active, working on live
traffic.

CHAPTER 15


1. B, D. Historically, network devices were managed
through command-line interfaces (CLIs) using
protocols such as Telnet and Secure Shell (SSH).
2. C. We’ve seen in Chapter 8 an example of a
network controller with Cisco DNA Center. Cisco
DNA Center can be used to completely configure,
manage, and monitor networks.
3. B, C. There are usually two types of approaches
to infrastructure as code: declarative and
imperative. With the declarative approach, the
desired state of the system is defined, and then
the system executes all the steps that need to
happen in order to attain the desired state. The
imperative approach defines a set of commands
that have to be executed in a certain order for the
system to achieve the desired state.
4. A, C. Implementing infrastructure as code
processes leads to shorter deployment times for
Free download pdf