Which tasks is the session management path responsible for? (Choose three.)
Which tasks is the session management path responsible for? (Choose three.)A . Verifying IP checksumsB . Performing route lookupC . Performing session lookupD . Allocating NAT translationsE . Checking TCP sequence numbersF . Checking packets against the access listView AnswerAnswer: B,D,F
Which sensor mode can deny attackers inline?
Which sensor mode can deny attackers inline?A . IPSB . fail-closeC . IDSD . fail-openView AnswerAnswer: A
Which type of security control is defense in depth?
Which type of security control is defense in depth?A . Threat mitigationB . Risk analysisC . Botnet mitigationD . Overt and covert channelsView AnswerAnswer: A
What security feature allows a private IP address to access the Internet by translating it to a public address?
What security feature allows a private IP address to access the Internet by translating it to a public address?A . NATB . hairpinningC . Trusted Network DetectionD . Certification AuthorityView AnswerAnswer: A
Which protocol provides security to Secure Copy?
Which protocol provides security to Secure Copy?A . IPsecB . SSHC . HTTPSD . ESPView AnswerAnswer: B
Which options are filtering options used to display SDEE message types? (Choose two.)
Which options are filtering options used to display SDEE message types? (Choose two.)A . stopB . noneC . errorD . allView AnswerAnswer: C,D
Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method?
Which command will configure a Cisco ASA firewall to authenticate users when they enter the enable syntax using the local database with no fallback method?A . aaa authentication enable console LOCAL SERVER_GROUPB . aaa authentication enable console SERVER_GROUP LOCALC . aaa authentication enable console localD . aaa authentication enable console...
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?A . Deny the connection inline.B . Perform a Layer 6 reset.C . Deploy an antimalware system.D . Enable bypass mode.View AnswerAnswer: A
Which command initializes a lawful intercept view?
Which command initializes a lawful intercept view?A . username cisco1 view lawful-intercept password ciscoB . parser view cisco li-viewC . li-view cisco user cisco1 password ciscoD . parser view li-view inclusiveView AnswerAnswer: C
Which alert protocol is used with Cisco IPS Manager Express to support up to 10 sensors?
Which alert protocol is used with Cisco IPS Manager Express to support up to 10 sensors?A . SDEEB . SyslogC . SNMPD . CSMView AnswerAnswer: A