How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?
How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?A . Issue the command anyconnect keep-installer under the group policy or username webvpn modeB . Issue the command anyconnect keep-installer installed in the global configurationC . Issue the command anyconnect keep-installer installed under the group...
which term best describes the concept of preventing the modification of data in transit and in storage?
which term best describes the concept of preventing the modification of data in transit and in storage?A . ConfidentialityB . IntegrityC . AvailabilityD . fidelityView AnswerAnswer: B Explanation: Integrity for data means that changes made to data are done only by authorized individuals/systems. Corruption of data is a failure to...
Which type of attack is directed against the network directly:
Which type of attack is directed against the network directly:A . Denial of ServiceB . phishingC . trojan horseView AnswerAnswer: A
Which security measures can protect the control plane of a Cisco router? (Choose two.)
Which security measures can protect the control plane of a Cisco router? (Choose two.)A . CCPrB . Parser viewsC . Access control listsD . Port securityE . CoPPView AnswerAnswer: A,E
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)A . TACACS uses TCP to communicate with the NAC . TACACS can encrypt the entire packet that is sent to the NAE . TACACS supports per-command authorization.F . TACACS authenticates and authorizes simultaneously, causing fewer packets to...
What command could you implement in the firewall to conceal internal IP address?
What command could you implement in the firewall to conceal internal IP address?A . no source-routeB . no broadcast….C . no proxy-arpView AnswerAnswer: C
In which configuration mode do you configure the ip ospf authentication-key 1 command?
In which configuration mode do you configure the ip ospf authentication-key 1 command?A . InterfaceB . routing processC . globalD . privilegedView AnswerAnswer: A
Which statement about the device time is true?
Refer to the exhibit. Which statement about the device time is true?A . The time is authoritative, but the NTP process has lost contact with its servers.B . The time is authoritative because the clock is in sync.C . The clock is out of sync.D . NTP is configured incorrectly.E...
How does a device on a network using ISE receive its digital certificate during the new-device registration process?
How does a device on a network using ISE receive its digital certificate during the new-device registration process? A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server. B. ISE issues a certificate from its internal CA server. C. ISE...
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...