If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?
If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?A . The interface on both switches may shut downB . STP loops may occurC . The switch with the higher native VLAN may shut downD . The interface with the...
Which sensor mode can deny attackers inline?
Which sensor mode can deny attackers inline?A . IPSB . fail-closeC . IDSD . fail-openView AnswerAnswer: A Explanation: Deny attacker inline: This action denies packets from the source IP address of the attacker for a configurable duration of time, after which the deny action can be dynamically removed. Available only...
Which type of mirroring does SPAN technology perform?
Which type of mirroring does SPAN technology perform?A . Remote mirroring over Layer 2B . Remote mirroring over Layer 3C . Local mirroring over Layer 2D . Local mirroring over Layer 3View AnswerAnswer: C Explanation: You can analyze network traffic passing through ports or VLANs by using SPAN or RSPAN...
Which statement about communication over failover interfaces is true?
Which statement about communication over failover interfaces is true?A . All information that is sent over the failover and stateful failover interfaces is sent as clear text by default.B . All information that is sent over the failover interface is sent as clear text, but the stateful failover link is...
Which two features are commonly used by CoPP and CPPr to protect the control plane?
Which two features are commonly used by CoPP and CPPr to protect the control plane?A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B Explanation: For example, you can specify that management traffic, such as SSH/HTTPS/SSL and so on,...
What is one requirement for locking a wired or wireless device from ISE?
What is one requirement for locking a wired or wireless device from ISE?A . The ISE agent must be installed on the device.B . The device must be connected to the network when the lock command is executed.C . The user must approve the locking action.D . The organization must...
What is the purpose of the Integrity component of the CIA triad?
What is the purpose of the Integrity component of the CIA triad?A . to ensure that only authorized parties can modify dataB . to determine whether data is relevantC . to create a process for accessing dataD . to ensure that only authorized parties can view dataView AnswerAnswer: A Explanation:...
Which statement about the device time is true?
Refer to the exhibit. Which statement about the device time is true?A . The time is authoritative, but the NTP process has lost contact with its servers.B . The time is authoritative because the clock is in sync.C . The clock is out of sync.D . NTP is configured incorrectly.E...
What features can protect the data plane? (Choose three.)
What features can protect the data plane? (Choose three.)A . policingB . ACLsC . IPSD . antispoofingE . QoSF . DHCP-snoopingView AnswerAnswer: B,CD Explanation: + Block unwanted traffic at the router. If your corporate policy does not allow TFTP traffic, just implement ACLs that deny traffic that is not allowed....
Which three statements about host-based IPS are true? (Choose three.)
Which three statements about host-based IPS are true? (Choose three.)A . It can view encrypted files.B . It can have more restrictive policies than network-based IPD . It can generate alerts based on behavior at the desktop level.E . It can be deployed at the perimeter.F . It uses signature-based...