In which two situations should you use out-of-band management? (Choose two.)
In which two situations should you use out-of-band management? (Choose two.)A . when a network device fails to forward packetsB . when you require ROMMON accessC . when management applications need concurrent access to the deviceD . when you require administrator access from multiple locationsE . when the control plane...
With which preprocesor do you detect incomplete TCP handshakes
With which preprocesor do you detect incomplete TCP handshakesA . rate based preventionB . portscan detectionView AnswerAnswer: A
Which statement provides the best definition of malware?
Which statement provides the best definition of malware?A . Malware is unwanted software that is harmful or destructive.B . Malware is software used by nation states to commit cyber crimes.C . Malware is a collection of worms, viruses, and Trojan horses that is distributed as a single package.D . Malware...
While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?A . IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.B . ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.C . IKE version 2 security associations are established...
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B
What is the FirePOWER impact flag used for?
What is the FirePOWER impact flag used for?A . A value that indicates the potential severity of an attack.B . A value that the administrator assigns to each signature.C . A value that sets the priority of a signature.D . A value that measures the application awareness.View AnswerAnswer: A
which port should (or would) be open if VPN NAT-T was enabled
which port should (or would) be open if VPN NAT-T was enabledA . port 500B . port 500 outside interfaceC . port 4500 outside interfaceD . port 4500 ipsecView AnswerAnswer: D
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?A . Create a whitelist...
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?A . STP elects the root bridgeB . STP selects the root portC . STP selects the designated portD . STP blocks one of the portsView AnswerAnswer: A
What type of packet creates and performs network operations on a network device?
What type of packet creates and performs network operations on a network device?A . control plane packetsB . data plane packetsC . management plane packetsD . services plane packetsView AnswerAnswer: A