Which statement about extended access lists is true?
Which statement about extended access lists is true?A . Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destinationB . Extended access lists perform filtering that is based on source and destination and are most effective when applied to...
Which command verifies phase 1 of an IPsec VPN on a Cisco router?
Which command verifies phase 1 of an IPsec VPN on a Cisco router?A . show crypto mapB . show crypto ipsec saC . show crypto isakmp saD . show crypto engine connection activeView AnswerAnswer: C
After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?
After reloading a router, you issue the dir command to verify the installation and observe that the image file appears to be missing. For what reason could the image file fail to appear in the dir output?A . The secure boot-image command is configured.B . The secure boot-comfit command is...
Which firewall configuration must you perform to allow traffic to flow in both directions between two zones?
Which firewall configuration must you perform to allow traffic to flow in both directions between two zones?A . You must configure two zone pairs, one for each direction.B . You can configure a single zone pair that allows bidirectional traffic flows for any zone.C . You can configure a single...
Which syslog severity level is level number 7?
Which syslog severity level is level number 7?A . WarningB . InformationalC . NotificationD . DebuggingView AnswerAnswer: D
Which Sourcefire logging action should you choose to record the most detail about a connection?
Which Sourcefire logging action should you choose to record the most detail about a connection?A . Enable logging at the end of the session.B . Enable logging at the beginning of the session.C . Enable alerts via SNMP to log events off-box.D . Enable eStreamer to log events off-box.View AnswerAnswer:...
Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)
Which RADIUS server authentication protocols are supported on Cisco ASA firewalls? (Choose three.)A . EAPB . ASCIIC . PAPD . PEAPE . MS-CHAPv1F . MS-CHAPv2View AnswerAnswer: C,E,F
Which syslog severity level is level number 7?
Which syslog severity level is level number 7?A . WarningB . InformationalC . NotificationD . DebuggingView AnswerAnswer: D
Which of the following are features of IPsec transport mode? (Choose three.)
Which of the following are features of IPsec transport mode? (Choose three.)A . IPsec transport mode is used between end stationsB . IPsec transport mode is used between gatewaysC . IPsec transport mode supports multicastD . IPsec transport mode supports unicastE . IPsec transport mode encrypts only the payloadF ....
Which command should be used to enable AAA authentication to determine if a user can access the privilege command level?
Which command should be used to enable AAA authentication to determine if a user can access the privilege command level?A . aaa authentication enable levelB . aaa authentication enable default localC . aaa authentication enable method defaultD . aaa authentication enable localView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/fsecur_r/srfathen.html