SIMULATION
SIMULATION Scenario Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements. New additional connectivity requirements: Once the correct ASA configurations have been configured: To access ASDM, click the ASA icon in the topology diagram. To access the...
What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)
What are two ways to prevent eavesdropping when you perform device-management tasks? (Choose two.)A . Use an SSH connection.B . Use SNMPv3.C . Use out-of-band management.D . Use SNMPv2.E . Use in-band management.View AnswerAnswer: A,B
By default, how does a zone-based firewall handle traffic to and from the self zone?
By default, how does a zone-based firewall handle traffic to and from the self zone?A . It permits all traffic without inspection.B . It inspects all traffic to determine how it is handled.C . it permits all traffic after inspectionD . it drops all traffic.View AnswerAnswer: C
What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?
What VPN feature allows Internet traffic and local LAN/WAN traffic to use the same network connection?A . split tunnelingB . hairpinningC . tunnel modeD . transparent modeView AnswerAnswer: A
Which statement about communication over failover interfaces is true?
Which statement about communication over failover interfaces is true?A . All information that is sent over the failover and stateful failover interfaces is sent as clear text by default.B . All information that is sent over the failover interface is sent as clear text, but the stateful failover link is...
to work?
Which line in the following OSPF configuration will not be required for MD5 authentication to work? interface GigabitEthernet0/1 ip address 192.168.10.1 255.255.255.0 ip ospf authentication message-digest ip ospf message-digest-key 1 md5 CCNA ! router ospf 65000 router-id 192.168.10.1 area 20 authentication message-digest network 10.1.1.0 0.0.0.255 area 10 network 192.168.10.0 0.0.0.255...
What is an advantage of placing an IPS on the inside of a network?
What is an advantage of placing an IPS on the inside of a network?A . It can provide higher throughput.B . It receives traffic that has already been filtered.C . It receives every inbound packet.D . It can provide greater security.View AnswerAnswer: B
Which command initializes a lawful intercept view?
Which command initializes a lawful intercept view?A . username cisco1 view lawful-intercept password ciscoB . parser view cisco li-viewC . li-view cisco user cisco1 password ciscoD . parser view li-view inclusiveView AnswerAnswer: C
Which three statements describe DHCP spoofing attacks? (Choose three.)
Which three statements describe DHCP spoofing attacks? (Choose three.)A . They can modify traffic in transit.B . They are used to perform man-in-the-middle attacks.C . They use ARP poisoning.D . They can access most network devices.E . They protect the identity of the attacker by masking the DHCP address.F ....
How many times was a read-only string used to attempt a write operation?
Refer to the exhibit. How many times was a read-only string used to attempt a write operation?A . 9B . 6C . 4D . 3E . 2View AnswerAnswer: A