Which two characteristics of a PVLAN are true?
Which two characteristics of a PVLAN are true?A . isolated ports cannot communicate with other ports on the same VLAC . They require VTP to be enabled in server mode.D . Promiscuous ports can communicate with PVLAN portsE . PVLAN ports can be configured as EtherChannel ports.F . Community ports...
Which command is used to verify that a VPN connection is established between two endpoints and that the connection is passing?
Which command is used to verify that a VPN connection is established between two endpoints and that the connection is passing?A . Firewall#sh crypto ipsec saB . Firewall#sh crypto isakmp saC . Firewall#debug crypto isakmpD . Firewall#sh crypto sessionView AnswerAnswer: A
How does the Cisco ASA use Active Directory to authorize VPN users?
How does the Cisco ASA use Active Directory to authorize VPN users?A . It queries the Active Directory server for a specific attribute for the specified user.B . It sends the username and password to retrieve an ACCEPT or REJECT message from the Active Directory server.C . It downloads and...
When users login to the Clientless SSLVPN using https://209.165.201.2/test, which group policy will be applied?
Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....
If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two.)
If a router configuration includes the line aaa authentication login default group tacacs+ enable, which events will occur when the TACACS+ server returns an error? (Choose two.)A . The user will be prompted to authenticate using the enable passwordB . Authentication attempts to the router will be deniedC . Authentication...
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)A . AESB . 3DESC . DESD . MD5E . DH-1024F . SHA-384View AnswerAnswer: A,F
In which three cases does the ASA firewall permit inbound HTTP GET requests during normal operations? (Choose three).
In which three cases does the ASA firewall permit inbound HTTP GET requests during normal operations? (Choose three).A . when matching NAT entries are configuredB . when matching ACL entries are configuredC . when the firewall receives a SYN-ACK packetD . when the firewall receives a SYN packetE . when...
If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?
Refer to the exhibit. If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?A . The supplicant will fail to advance beyond the webauth method.B . The switch will cycle through the configured authentication methods indefinitely.C . The authentication attempt will...
Which two protocols enable Cisco Configuration Professional to pull IPS alerts from a Cisco ISR router? (Choose two.)
Which two protocols enable Cisco Configuration Professional to pull IPS alerts from a Cisco ISR router? (Choose two.)A . syslogB . SDEEC . FTPD . TFTPE . SSHF . HTTPSView AnswerAnswer: B, F Explanation: http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/prod_white_paper0900aecd805c4ea8.html Step 4: Enabling IOS IPS The fourth step is to configure IOS IPS using the...
What hash type does Cisco use to validate the integrity of downloaded images?
What hash type does Cisco use to validate the integrity of downloaded images?A . Sha1B . Sha2C . Md5D . Md1View AnswerAnswer: C