In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?

In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?A . gratuitous ARPB . ARP poisoningC . IP spoofingD . MAC spoofingView AnswerAnswer: D

December 21, 2018 No Comments READ MORE +

Which filter uses in Web reputation to prevent from Web Based Attacks? (Choose two)

Which filter uses in Web reputation to prevent from Web Based Attacks? (Choose two)A . outbreak filterB . buffer overflow filterC . bayesian overflow filterD . web reputationE . exploit filteringView AnswerAnswer: AD

December 21, 2018 No Comments READ MORE +

Which two features are commonly used CoPP and CPPr to protect the control plane? (Choose two.)

Which two features are commonly used CoPP and CPPr to protect the control plane? (Choose two.)A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B

December 21, 2018 No Comments READ MORE +

How does the Cisco ASA use Active Directory to authorize VPN users?

How does the Cisco ASA use Active Directory to authorize VPN users?A . It queries the Active Directory server for a specific attribute for the specified user.B . It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server.C . It downloads and...

December 21, 2018 No Comments READ MORE +

What can the SMTP preprocessor in FirePOWER normalize?

What can the SMTP preprocessor in FirePOWER normalize?A . It can extract and decode email attachments in client to server traffic.B . It can look up the email sender.C . It compares known threats to the email sender.D . It can forward the SMTP traffic to an email filter server.E...

December 19, 2018 No Comments READ MORE +

What show command can see vpn tunnel establish with traffic passing through.

What show command can see vpn tunnel establish with traffic passing through.A . (config)# show crypto ipsec saB . #show crypto ipsec saC . (config-if)#View AnswerAnswer: A

December 19, 2018 No Comments READ MORE +

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?

If you change the native VLAN on the trunk port to an unused VLAN, what happens if an attacker attempts a double-tagging attack?A . The trunk port would go into an error-disabled state.B . A VLAN hopping attack would be successful.C . A VLAN hopping attack would be prevented.D ....

December 19, 2018 No Comments READ MORE +

What is a reason for an organization to deploy a personal firewall?

What is a reason for an organization to deploy a personal firewall?A . To protect endpoints such as desktops from malicious activity.B . To protect one virtual network segment from another.C . To determine whether a host meets minimum security posture requirements.D . To create a separate, non-persistent virtual environment...

December 19, 2018 No Comments READ MORE +

When an administrator initiates a device wipe command from the ISE, what is the immediate effect?

When an administrator initiates a device wipe command from the ISE, what is the immediate effect?A . It requests the administrator to choose between erasing all device data or only managed corporate data.B . It requests the administrator to enter the device PIN or password before proceeding with the operation.C...

December 18, 2018 No Comments READ MORE +

Which two statements regarding the ASA VPN configurations are correct?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

December 17, 2018 No Comments READ MORE +