What is a reason for an organization to deploy a personal firewall?

What is a reason for an organization to deploy a personal firewall?A . To protect endpoints such as desktops from malicious activity.B . To protect one virtual network segment from another.C . To determine whether a host meets minimum security posture requirements.D . To create a separate, non-persistent virtual environment...

January 22, 2020 No Comments READ MORE +

Which options are filtering options used to display SDEE message types? (Choose two.)

Which options are filtering options used to display SDEE message types? (Choose two.)A . stopB . noneC . errorD . allView AnswerAnswer: C,D Explanation: SDEE Messages + All -- SDEE error, status, and alert messages are shown. + Error -- Only SDEE error messages are shown. + Status -- Only...

January 22, 2020 No Comments READ MORE +

What is the only permitted operation for processing multicast traffic on zone-based firewalls?

What is the only permitted operation for processing multicast traffic on zone-based firewalls? A. Only control plane policing can protect the control plane against multicast traffic. B. Stateful inspection of multicast traffic is supported only for the self-zone. C. Stateful inspection for multicast traffic is supported only between the self-zone...

January 22, 2020 No Comments READ MORE +

Which command verifies phase 1 of an IPsec VPN on a Cisco router?

Which command verifies phase 1 of an IPsec VPN on a Cisco router?A . show crypto mapB . show crypto ipsec saC . show crypto isakmp saD . show crypto engine connection activeView AnswerAnswer: C Explanation: A show crypto isakmp sa command shows the ISAKMP SA to be in MM_NO_STATE....

January 22, 2020 No Comments READ MORE +

For what reason would you configure multiple security contexts on the ASA firewall?

For what reason would you configure multiple security contexts on the ASA firewall? A. To separate different departments and business units. B. To enable the use of VRFs on routers that are adjacently connected. C. To provide redundancy and high availability within the organization. D. To enable the use of...

January 21, 2020 No Comments READ MORE +

Your network contains an Active Directory domain named contoso.com

HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016. Server1 has IP Address Management (IPAM) installed. Server2 has the DHCP Server role installed. The IPAM server retrieves data from Server2. The domain has two users...

January 20, 2020 No Comments READ MORE +

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...

January 20, 2020 No Comments READ MORE +

Which four tunneling protocols are enabled in the DfltGrpPolicy group policy?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

January 20, 2020 No Comments READ MORE +

What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?

What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?A . It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January 1, 2014 and continue using the key indefinitely.B . It configures the device to begin...

January 20, 2020 No Comments READ MORE +

What is an advantage of implementing a Trusted Platform Module for disk encryption?

What is an advantage of implementing a Trusted Platform Module for disk encryption?A . It provides hardware authentication.B . It allows the hard disk to be transferred to another device without requiring re-encryption.disC . It supports a more complex encryption algorithm than other disk-encryption technologies.D . It can protect against...

January 19, 2020 No Comments READ MORE +