Which statement about extended access lists is true?

Which statement about extended access lists is true?A . Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destinationB . Extended access lists perform filtering that is based on source and destination and are most effective when applied to...

December 26, 2018 No Comments READ MORE +

Which command verifies phase 1 of an IPsec VPN on a Cisco router?

Which command verifies phase 1 of an IPsec VPN on a Cisco router?A . show crypto mapB . show crypto ipsec saC . show crypto isakmp saD . show crypto engine connection activeView AnswerAnswer: C

December 26, 2018 No Comments READ MORE +

After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?

After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?A . The secure boot-image command is configured.B . The secure boot-comfit command is...

December 24, 2018 No Comments READ MORE +

Which firewall configuration must you perform to allow traffic to flow in both directions between two zones?

Which firewall configuration must you perform to allow traffic to flow in both directions between two zones?A . You must configure two zone pairs, one for each direction.B . You can configure a single zone pair that allows bidirectional traffic flows for any zone.C . You can configure a single...

December 24, 2018 No Comments READ MORE +

Which syslog severity level is level number 7?

Which syslog severity level is level number 7?A . WarningB . InformationalC . NotificationD . DebuggingView AnswerAnswer: D

December 23, 2018 No Comments READ MORE +

Which Sourcefire logging action should you choose to record the most detail about a connection?

Which Sourcefire logging action should you choose to record the most detail about a connection?A . Enable logging at the end of the session.B . Enable logging at the beginning of the session.C . Enable alerts via SNMP to log events off-box.D . Enable eStreamer to log events off-box.View AnswerAnswer:...

December 23, 2018 1 Comment READ MORE +

Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)

Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)A . EAPB . ASCIIC . PAPD . PEAPE . MS-CHAPv1F . MS-CHAPv2View AnswerAnswer: C,E,F

December 23, 2018 No Comments READ MORE +

Which syslog severity level is level number 7?

Which syslog severity level is level number 7?A . WarningB . InformationalC . NotificationD . DebuggingView AnswerAnswer: D

December 22, 2018 No Comments READ MORE +

Which of the following are features of IPsec transport mode? (Choose three.)

Which of the following are features of IPsec transport mode? (Choose three.)A . IPsec transport mode is used between end stationsB . IPsec transport mode is used between gatewaysC . IPsec transport mode supports multicastD . IPsec transport mode supports unicastE . IPsec transport mode encrypts only the payloadF ....

December 22, 2018 No Comments READ MORE +

Which command should be used to enable AAA authentication to determine if a user can access the privilege command level?

Which command should be used to enable AAA authentication to determine if a user can access the privilege command level?A . aaa authentication enable levelB . aaa authentication enable default localC . aaa authentication enable method defaultD . aaa authentication enable localView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/fsecur_r/srfathen.html

December 21, 2018 No Comments READ MORE +