If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?

Refer to the exhibit. If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?A . The supplicant will fail to advance beyond the webauth method.B . The switch will cycle through the configured authentication methods indefinitely.C . The authentication attempt will...

October 31, 2018 No Comments READ MORE +

Which ports need to be active for AAA server and a Microsoft server to permit Active Directory authentication?

Which ports need to be active for AAA server and a Microsoft server to permit Active Directory authentication?A . 445 and 389B . 888 and 3389C . 636 and 4445D . 363 and 983View AnswerAnswer: A

October 30, 2018 No Comments READ MORE +

Referencing the CIA model, in which scenario is a hash-only function most appropriate?

Referencing the CIA model, in which scenario is a hash-only function most appropriate?A . securing wireless transmissions.B . securing data in files.C . securing real-time trafficD . securing data at restView AnswerAnswer: D

October 29, 2018 No Comments READ MORE +

What command can you use to verify the binding table status?

What command can you use to verify the binding table status?A . show ip dhcp snooping databaseB . show ip dhcp snooping bindingC . show ip dhcp snooping statisticsD . show ip dhcp poolE . show ip dhcp source bindingF . show ip dhcp snoopingView AnswerAnswer: A

October 28, 2018 No Comments READ MORE +

What is the most common Cisco Discovery Protocol version 1 attack?

What is the most common Cisco Discovery Protocol version 1 attack?A . Denial of ServiceB . MAC-address spoofingC . CAM-table overflowD . VLAN hoppingView AnswerAnswer: A

October 28, 2018 No Comments READ MORE +

What are two well-known security terms? (Choose Two)

What are two well-known security terms? (Choose Two)A . Phishing.B . BPDU guardC . LACPD . ransomewareE . hair-pinningView AnswerAnswer: AD

October 28, 2018 No Comments READ MORE +

In which two situations should you use in-band management? (Choose two.)

In which two situations should you use in-band management? (Choose two.)A . when management applications need concurrent access to the deviceB . when you require administrator access from multiple locationsC . when a network device fails to forward packetsD . when you require ROMMON accessE . when the control plane...

October 26, 2018 No Comments READ MORE +

While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10.10.2.B . IKE Phase 1 main mode has successfully negotiated between 10.1.1.5...

October 25, 2018 No Comments READ MORE +

How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?

How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?A . Issue the command anyconnect keep-installer under the group policy or username webvpn modeB . Issue the command anyconnect keep-installer installed in the global configurationC . Issue the command anyconnect keep-installer installed under the group...

October 25, 2018 No Comments READ MORE +

Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)

Which actions can a promiscuous IPS take to mitigate an attack? (Choose three.)A . Modifying packetsB . Requesting connection blockingC . Denying packetsD . Resetting the TCP connectionE . Requesting host blockingF . Denying framesView AnswerAnswer: B,D,E

October 24, 2018 No Comments READ MORE +