If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?
Refer to the exhibit. If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?A . The supplicant will fail to advance beyond the webauth method.B . The switch will cycle through the configured authentication methods indefinitely.C . The authentication attempt will...
Which ports need to be active for AAA server and a Microsoft server to permit Active Directory authentication?
Which ports need to be active for AAA server and a Microsoft server to permit Active Directory authentication?A . 445 and 389B . 888 and 3389C . 636 and 4445D . 363 and 983View AnswerAnswer: A
Referencing the CIA model, in which scenario is a hash-only function most appropriate?
Referencing the CIA model, in which scenario is a hash-only function most appropriate?A . securing wireless transmissions.B . securing data in files.C . securing real-time trafficD . securing data at restView AnswerAnswer: D
What command can you use to verify the binding table status?
What command can you use to verify the binding table status?A . show ip dhcp snooping databaseB . show ip dhcp snooping bindingC . show ip dhcp snooping statisticsD . show ip dhcp poolE . show ip dhcp source bindingF . show ip dhcp snoopingView AnswerAnswer: A
What is the most common Cisco Discovery Protocol version 1 attack?
What is the most common Cisco Discovery Protocol version 1 attack?A . Denial of ServiceB . MAC-address spoofingC . CAM-table overflowD . VLAN hoppingView AnswerAnswer: A
What are two well-known security terms? (Choose Two)
What are two well-known security terms? (Choose Two)A . Phishing.B . BPDU guardC . LACPD . ransomewareE . hair-pinningView AnswerAnswer: AD
In which two situations should you use in-band management? (Choose two.)
In which two situations should you use in-band management? (Choose two.)A . when management applications need concurrent access to the deviceB . when you require administrator access from multiple locationsC . when a network device fails to forward packetsD . when you require ROMMON accessE . when the control plane...
While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10.10.2.B . IKE Phase 1 main mode has successfully negotiated between 10.1.1.5...
How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?
How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?A . Issue the command anyconnect keep-installer under the group policy or username webvpn modeB . Issue the command anyconnect keep-installer installed in the global configurationC . Issue the command anyconnect keep-installer installed under the group...
Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)
Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)A . Modifying packetsB . Requesting connection blockingC . Denying packetsD . Resetting the TCP connectionE . Requesting host blockingF . Denying framesView AnswerAnswer: B,D,E