How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?

How can the administrator enable permanent client installation in a Cisco AnyConnect VPN firewall configuration?A . Issue the command anyconnect keep-installer under the group policy or username webvpn modeB . Issue the command anyconnect keep-installer installed in the global configurationC . Issue the command anyconnect keep-installer installed under the group...

July 29, 2018 No Comments READ MORE +

which term best describes the concept of preventing the modification of data in transit and in storage?

which term best describes the concept of preventing the modification of data in transit and in storage?A . ConfidentialityB . IntegrityC . AvailabilityD . fidelityView AnswerAnswer: B Explanation: Integrity for data means that changes made to data are done only by authorized individuals/systems. Corruption of data is a failure to...

July 29, 2018 No Comments READ MORE +

Which type of attack is directed against the network directly:

Which type of attack is directed against the network directly:A . Denial of ServiceB . phishingC . trojan horseView AnswerAnswer: A

July 29, 2018 No Comments READ MORE +

Which security measures can protect the control plane of a Cisco router? (Choose two.)

Which security measures can protect the control plane of a Cisco router? (Choose two.)A . CCPrB . Parser viewsC . Access control listsD . Port securityE . CoPPView AnswerAnswer: A,E

July 28, 2018 No Comments READ MORE +

In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)

In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)A . TACACS uses TCP to communicate with the NAC . TACACS can encrypt the entire packet that is sent to the NAE . TACACS supports per-command authorization.F . TACACS authenticates and authorizes simultaneously, causing fewer packets to...

July 28, 2018 No Comments READ MORE +

What command could you implement in the firewall to conceal internal IP address?

What command could you implement in the firewall to conceal internal IP address?A . no source-routeB . no broadcast….C . no proxy-arpView AnswerAnswer: C

July 28, 2018 No Comments READ MORE +

In which configuration mode do you configure the ip ospf authentication-key 1 command?

In which configuration mode do you configure the ip ospf authentication-key 1 command?A . InterfaceB . routing processC . globalD . privilegedView AnswerAnswer: A

July 28, 2018 No Comments READ MORE +

Which statement about the device time is true?

Refer to the exhibit. Which statement about the device time is true?A . The time is authoritative, but the NTP process has lost contact with its servers.B . The time is authoritative because the clock is in sync.C . The clock is out of sync.D . NTP is configured incorrectly.E...

July 26, 2018 No Comments READ MORE +

How does a device on a network using ISE receive its digital certificate during the new-device registration process?

How does a device on a network using ISE receive its digital certificate during the new-device registration process? A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server. B. ISE issues a certificate from its internal CA server. C. ISE...

July 23, 2018 No Comments READ MORE +

If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?

If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...

July 23, 2018 No Comments READ MORE +