In which two situations should you use out-of-band management? (Choose two.)

In which two situations should you use out-of-band management? (Choose two.)A . when a network device fails to forward packetsB . when you require ROMMON accessC . when management applications need concurrent access to the deviceD . when you require administrator access from multiple locationsE . when the control plane...

September 25, 2018 No Comments READ MORE +

With which preprocesor do you detect incomplete TCP handshakes

With which preprocesor do you detect incomplete TCP handshakesA . rate based preventionB . portscan detectionView AnswerAnswer: A

September 24, 2018 No Comments READ MORE +

Which statement provides the best definition of malware?

Which statement provides the best definition of malware?A . Malware is unwanted software that is harmful or destructive.B . Malware is software used by nation states to commit cyber crimes.C . Malware is a collection of worms, viruses, and Trojan horses that is distributed as a single package.D . Malware...

September 22, 2018 No Comments READ MORE +

While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?A . IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.B . ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.C . IKE version 2 security associations are established...

September 21, 2018 No Comments READ MORE +

Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)

Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B

September 20, 2018 No Comments READ MORE +

What is the FirePOWER impact flag used for?

What is the FirePOWER impact flag used for?A . A value that indicates the potential severity of an attack.B . A value that the administrator assigns to each signature.C . A value that sets the priority of a signature.D . A value that measures the application awareness.View AnswerAnswer: A

September 19, 2018 No Comments READ MORE +

which port should (or would) be open if VPN NAT-T was enabled

which port should (or would) be open if VPN NAT-T was enabledA . port 500B . port 500 outside interfaceC . port 4500 outside interfaceD . port 4500 ipsecView AnswerAnswer: D

September 18, 2018 No Comments READ MORE +

You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?

You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?A . Create a whitelist...

September 17, 2018 No Comments READ MORE +

When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?

When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?A . STP elects the root bridgeB . STP selects the root portC . STP selects the designated portD . STP blocks one of the portsView AnswerAnswer: A

September 17, 2018 No Comments READ MORE +

What type of packet creates and performs network operations on a network device?

What type of packet creates and performs network operations on a network device?A . control plane packetsB . data plane packetsC . management plane packetsD . services plane packetsView AnswerAnswer: A

September 15, 2018 No Comments READ MORE +