SIMULATION

SIMULATION Scenario Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. New additional connectivity requirements: Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram. To access the...

December 9, 2018 No Comments READ MORE +

What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)

What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)A . Use an SSH connection.B . Use SNMPv3.C . Use out-of-band management.D . Use SNMPv2.E . Use in-band management.View AnswerAnswer: A,B

December 8, 2018 No Comments READ MORE +

By default, how does a zone-based firewall handle traffic to and from the self zone?

By default, how does a zone-based firewall handle traffic to and from the self zone?A . It permits all traffic without inspection.B . It inspects all traffic to determine how it is handled.C . it permits all traffic after inspectionD . it drops all traffic.View AnswerAnswer: C

December 8, 2018 No Comments READ MORE +

What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?

What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?A . split tunnelingB . hairpinningC . tunnel modeD . transparent modeView AnswerAnswer: A

December 8, 2018 No Comments READ MORE +

Which statement about communication over failover interfaces is true?

Which statement about communication over failover interfaces is true?A . All information that is sent over the failover and stateful failover interfaces is sent as clear text by default.B . All information that is sent over the failover interface is sent as clear text, but the stateful failover link is...

December 6, 2018 No Comments READ MORE +

to work?

Which line in the following OSPF configuration will not be required for MD5 authentication to work? interface GigabitEthernet0/1 ip address 192.168.10.1 255.255.255.0 ip ospf authentication message-digest ip ospf message-digest-key 1 md5 CCNA ! router ospf 65000 router-id 192.168.10.1 area 20 authentication message-digest network 10.1.1.0 0.0.0.255 area 10 network 192.168.10.0 0.0.0.255...

December 6, 2018 No Comments READ MORE +

What is an advantage of placing an IPS on the inside of a network?

What is an advantage of placing an IPS on the inside of a network?A . It can provide higher throughput.B . It receives traffic that has already been filtered.C . It receives every inbound packet.D . It can provide greater security.View AnswerAnswer: B

December 6, 2018 No Comments READ MORE +

Which command initializes a lawful intercept view?

Which command initializes a lawful intercept view?A . username cisco1 view lawful-intercept password ciscoB . parser view cisco li-viewC . li-view cisco user cisco1 password ciscoD . parser view li-view inclusiveView AnswerAnswer: C

December 5, 2018 No Comments READ MORE +

Which three statements describe DHCP spoofing attacks? (Choose three.)

Which three statements describe DHCP spoofing attacks? (Choose three.)A . They can modify traffic in transit.B . They are used to perform man-in-the-middle attacks.C . They use ARP poisoning.D . They can access most network devices.E . They protect the identity of the attacker by masking the DHCP address.F ....

December 5, 2018 No Comments READ MORE +

How many times was a read-only string used to attempt a write operation?

Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A . 9B . 6C . 4D . 3E . 2View AnswerAnswer: A

December 4, 2018 No Comments READ MORE +