Which address block is reserved for locally assigned unique local addresses?

Which address block is reserved for locally assigned unique local addresses?A . 2002::/16B . FD00::/8C . 2001::/32D . FB00::/8View AnswerAnswer: B Explanation: The address block fc00::/7 is divided into two /8 groups: + The block fc00::/8 has not been defined yet. It has been proposed to be managed by an...

January 19, 2020 No Comments READ MORE +

Which user authentication method is used when users login to the Clientless SSLVPN portal using https://209.165.201.2/test?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

January 19, 2020 No Comments READ MORE +

Router(config)#aaa server?

What is a possible reason for the error message? Router(config)#aaa server?% Unrecognized command A. The command syntax requires a space after the word “server” B. The command is invalid on the target device C. The router is already running the latest operating system D. The router is a new device...

January 19, 2020 No Comments READ MORE +

Which two statements about stateless firewalls are true? (Choose two.)

Which two statements about stateless firewalls are true? (Choose two.)A . They compare the 5-tuple of each incoming packet against configurable rules.B . They cannot track connections.C . They are designed to work most efficiently with stateless protocols such as HTTP or HTTPE . Cisco IOS cannot implement them because...

January 19, 2020 No Comments READ MORE +

Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?

Which command causes a Layer 2 switch interface to operate as a Layer 3 interface?A . no switchport nonnegotiateB . switchportC . no switchport mode dynamic autoD . no switchportView AnswerAnswer: D Explanation: The no switchport command makes the interface Layer 3 capable. Source: http://www.cisco.com/c/en/us/support/docs/lan-switching/inter-vlan-routing/41860-howto­L3- intervlanrouting.html

January 18, 2020 No Comments READ MORE +

According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network?

According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)A . BOOTPB . TFTPC . DNSD . MABE . HTTPF . 802.1xView AnswerAnswer: A,B,C Explanation: ACLs are...

January 18, 2020 No Comments READ MORE +

Which of the following are features of IPsec transport mode? (Choose three.)

Which of the following are features of IPsec transport mode? (Choose three.)A . IPsec transport mode is used between end stationsB . IPsec transport mode is used between gatewaysC . IPsec transport mode supports multicastD . IPsec transport mode supports unicastE . IPsec transport mode encrypts only the payloadF ....

January 18, 2020 No Comments READ MORE +

How should you describe each identity provider?

HOTSPOT You manage a network that includes an on-premises Active Directory Domain Services domain and an Azure Active Directory (Azure AD). Employees are required to use different accounts when using on-premises or cloud resources. You must recommend a solution that lets employees sign in to all company resources by using...

January 17, 2020 No Comments READ MORE +

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...

January 17, 2020 No Comments READ MORE +

How many times was a read-only string used to attempt a write operation?

Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A . 9B . 6C . 4D . 3E . 2View AnswerAnswer: A Explanation: To check the status of Simple Network Management Protocol (SNMP) communications, use the show snmp command in user EXEC or...

January 17, 2020 No Comments READ MORE +