If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?A . The trunk port would go into an error-disabled state.B . A VLAN hopping attack would be successful.C . A VLAN hopping attack would be prevented.D ....

November 5, 2019 No Comments READ MORE +

Which statement about personal firewalls is true?

Which statement about personal firewalls is true?A . They can protect a system by denying probing requests.B . They are resilient against kernel attacks.C . They can protect email messages and private documents in a similar way to a VPE . They can protect the network against attacks.View AnswerAnswer: A...

November 5, 2019 No Comments READ MORE +

Which two statements about Telnet access to the ASA are true? (Choose two).

Which two statements about Telnet access to the ASA are true? (Choose two).A . You may VPN to the lowest security interface to telnet to an inside interface.B . You must configure an AAA server to enable Telnet.C . You can access all interfaces on an ASA using Telnet.D ....

November 5, 2019 No Comments READ MORE +

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...

November 4, 2019 No Comments READ MORE +

Which two features are commonly used by CoPP and CPPr to protect the control plane?

Which two features are commonly used by CoPP and CPPr to protect the control plane?A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B Explanation: For example, you can specify that management traffic, such as SSH/HTTPS/SSL and so on,...

November 4, 2019 No Comments READ MORE +

Which statement represents a difference between an access list on an ASA versus an access list on a router?

Which statement represents a difference between an access list on an ASA versus an access list on a router?A . The ASA does not support standard access listsB . The ASA does not support extended access listsC . The ASA does not ever use a wildcard maskD . The ASA...

November 3, 2019 No Comments READ MORE +

What is an advantage of placing an IPS on the inside of a network?

What is an advantage of placing an IPS on the inside of a network?A . It can provide higher throughput.B . It receives traffic that has already been filtered.C . It receives every inbound packet.D . It can provide greater security.View AnswerAnswer: B Explanation: Firewalls are generally designed to be...

November 3, 2019 No Comments READ MORE +

Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?

Which SNMPv3 security level provides authentication using HMAC with MD5, but does not use encryption?A . authNoPrivB . noAuthNoPrivC . authPrivD . NoauthPrivView AnswerAnswer: A

November 3, 2019 No Comments READ MORE +

If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?

Refer to the exhibit. If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?A . The supplicant will fail to advance beyond the webauth method.B . The switch will cycle through the configured authentication methods indefinitely.C . The authentication attempt will...

November 3, 2019 No Comments READ MORE +

What can the SMTP preprocessor in FirePOWER normalize?

What can the SMTP preprocessor in FirePOWER normalize?A . It can extract and decode email attachments in client to server traffic.B . It can look up the email sender.C . It compares known threats to the email sender.D . It can forward the SMTP traffic to an email filter server.E...

November 3, 2019 No Comments READ MORE +