According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network?
According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)A . BOOTPB . TFTPC . DNSD . MABE . HTTPF . 802.1xView AnswerAnswer: A,B,C Explanation: ACLs are...
In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?
In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?A . gratuitous ARPB . ARP poisoningC . IP spoofingD . MAC spoofingView AnswerAnswer: D Explanation: If a switch receives an inferior BPDU, nothing...
What command can you use to verify the binding table status?
What command can you use to verify the binding table status?A . show ip dhcp snooping databaseB . show ip dhcp snooping bindingC . show ip dhcp snooping statisticsD . show ip dhcp poolE . show ip dhcp source bindingF . show ip dhcp snoopingView AnswerAnswer: A Explanation: A device's...
How does the Cisco ASA use Active Directory to authorize VPN users?
How does the Cisco ASA use Active Directory to authorize VPN users?A . It queries the Active Directory server for a specific attribute for the specified user.B . It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server.C . It downloads and...
What is an advantage of implementing a Trusted Platform Module for disk encryption?
What is an advantage of implementing a Trusted Platform Module for disk encryption?A . It provides hardware authentication.B . It allows the hard disk to be transferred to another device without requiring re-encryption.disC . It supports a more complex encryption algorithm than other disk-encryption technologies.D . It can protect against...
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)A . TACACS uses TCP to communicate with the NAC . TACACS can encrypt the entire packet that is sent to the NAE . TACACS supports per-command authorization.F . TACACS authenticates and authorizes simultaneously, causing fewer packets to...
What two solutions can you use?
You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two).A . Configure a proxy server to hide users' local IP addresses.B . Assign unique IP addresses...
Which EAP method uses Protected Access Credentials?
Which EAP method uses Protected Access Credentials?A . EAP-FASTB . EAP-TLSC . EAP-PEAPD . EAP-GTCView AnswerAnswer: A Explanation: Flexible Authentication via Secure Tunneling (EAP-FAST) is a protocol proposal by Cisco Systems as a replacement for LEAP. The protocol was designed to address the weaknesses of LEAP while preserving the "lightweight"...
What is the FirePOWER impact flag used for?
What is the FirePOWER impact flag used for?A . A value that indicates the potential severity of an attack.B . A value that the administrator assigns to each signature.C . A value that sets the priority of a signature.D . A value that measures the application awareness.View AnswerAnswer: A Explanation:...
What is the effect of the given configuration?
Refer to the exhibit. What is the effect of the given configuration?A . It prevents keychain authenticationB . The two devices are able to pass the message digest to one anotherC . The two routers receive normal updates from one anotherD . It enables authenticationView AnswerAnswer: D