If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?
If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?A . The trunk port would go into an error-disabled state.B . A VLAN hopping attack would be successful.C . A VLAN hopping attack would be prevented.D ....
Which statement about personal firewalls is true?
Which statement about personal firewalls is true?A . They can protect a system by denying probing requests.B . They are resilient against kernel attacks.C . They can protect email messages and private documents in a similar way to a VPE . They can protect the network against attacks.View AnswerAnswer: A...
Which two statements about Telnet access to the ASA are true? (Choose two).
Which two statements about Telnet access to the ASA are true? (Choose two).A . You may VPN to the lowest security interface to telnet to an inside interface.B . You must configure an AAA server to enable Telnet.C . You can access all interfaces on an ASA using Telnet.D ....
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...
Which two features are commonly used by CoPP and CPPr to protect the control plane?
Which two features are commonly used by CoPP and CPPr to protect the control plane?A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B Explanation: For example, you can specify that management traffic, such as SSH/HTTPS/SSL and so on,...
Which statement represents a difference between an access list on an ASA versus an access list on a router?
Which statement represents a difference between an access list on an ASA versus an access list on a router?A . The ASA does not support standard access listsB . The ASA does not support extended access listsC . The ASA does not ever use a wildcard maskD . The ASA...
What is an advantage of placing an IPS on the inside of a network?
What is an advantage of placing an IPS on the inside of a network?A . It can provide higher throughput.B . It receives traffic that has already been filtered.C . It receives every inbound packet.D . It can provide greater security.View AnswerAnswer: B Explanation: Firewalls are generally designed to be...
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?
Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?A . authNoPrivB . noAuthNoPrivC . authPrivD . NoauthPrivView AnswerAnswer: A
If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?
Refer to the exhibit. If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?A . The supplicant will fail to advance beyond the webauth method.B . The switch will cycle through the configured authentication methods indefinitely.C . The authentication attempt will...
What can the SMTP preprocessor in FirePOWER normalize?
What can the SMTP preprocessor in FirePOWER normalize?A . It can extract and decode email attachments in client to server traffic.B . It can look up the email sender.C . It compares known threats to the email sender.D . It can forward the SMTP traffic to an email filter server.E...