Which statement about Cisco ACS authentication and authorization is true?
Which statement about Cisco ACS authentication and authorization is true?A . ACS servers can be clustered to provide scalability.B . ACS can query multiple Active Directory domains.C . ACS uses TACACS to proxy other authentication servers.D . ACS can use only one authorization profile to allow or deny requests.View AnswerAnswer:...
What are two default behaviors of the traffic on a zone based firewall? (Choose two)
What are two default behaviors of the traffic on a zone based firewall? (Choose two)A . All traffic between zones is implicitly blockedB . Communication is allowed between interfaces that are members of the same zoneC . The CBAC rules that are configured on router interfaces apply to zone interfaces.D...
Which statement represents, a difference between an access list on an ASA versus an access list on a router?
Which statement represents, a difference between an access list on an ASA versus an access list on a router?A . The ASA does not support standard access listsB . The ASA does not support extended access listsC . The ASA does not ever use a wildcard maskD . The ASA...
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?A . Deny the connection inline.B . Perform a Layer 6 reset.C . Deploy an antimalware system.D . Enable bypass mode.View AnswerAnswer: A Explanation: Deny connection inline: This action terminates the packet that...
What is the effect of the given command sequence?
Refer to the exhibit. What is the effect of the given command sequence?A . It configures IKE Phase 1.B . It configures a site-to-site VPN tunnel.C . It configures a crypto policy with a key size of 14400.D . It configures IPSec Phase 2.View AnswerAnswer: A Explanation: Configure the IPsec...
What does the policy map do in CoPP?
What does the policy map do in CoPP?A . defines service parametersB . defines packet selection parametersC . defines the action to be performedD . defines the packet filterView AnswerAnswer: C
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)A . deny attackerB . deny packetC . modify packetD . request block connectionE . request block hostF . reset TCP connectionView AnswerAnswer: A,B,C Explanation: In promiscuous mode, packets do not flow through the sensor. The disadvantage of...
Which type of secure connectivity does an extranet provide?
Which type of secure connectivity does an extranet provide?A . other company networks to your company networkB . remote branch offices to your company networkC . your company network to the InternetD . new networks to your company networkView AnswerAnswer: A Explanation: What is an Extranet? In the simplest terms...
What is the minimum Cisco IOS version that supports zone based firewalls?
What is the minimum Cisco IOS version that supports zone based firewalls?A . 12.1TB . 12.4(6)TC . 15.1D . 15.0View AnswerAnswer: B
For what reason would you configure multiple security contexts on the ASA firewall?
For what reason would you configure multiple security contexts on the ASA firewall? A. To separate different departments and business units. B. To enable the use of VRFs on routers that are adjacently connected. C. To provide redundancy and high availability within the organization. D. To enable the use of...