which will auto-nat process first (the focus is on auto-nat)

which will auto-nat process first (the focus is on auto-nat)A . dynamic Nat shortest prefixB . dynamic nat longest prefixC . static nat shortest prefixD . static nat longest prefixView AnswerAnswer: D

July 21, 2018 No Comments READ MORE +

What are two effects of the given command?

Refer to the exhibit. What are two effects of the given command? (Choose two.)A . It configures authentication to use AES 256.B . It configures authentication to use MD5 HMAD . It configures authorization use AES 256.E . It configures encryption to use MD5 HMAG . It configures encryption to...

July 21, 2018 1 Comment READ MORE +

A clientless SSL VPN user who is connecting on a Windows Vista computer is missing the menu option for Remote Desktop Protocol on the portal web page. Which action should you take to begin troubleshooting?

A clientless SSL VPN user who is connecting on a Windows Vista computer is missing the menu option for Remote Desktop Protocol on the portal web page. Which action should you take to begin troubleshooting?A . Ensure that the RDP2 plug-in is installed on the VPN gatewayB . Reboot the...

July 20, 2018 No Comments READ MORE +

What is the best way to confirm that AAA authentication is working properly?

What is the best way to confirm that AAA authentication is working properly?A . Use the test aaa command.B . Ping the NAS to confirm connectivity.C . Use the Cisco-recommended configuration for AAA authentication.D . Log into and out of the router, and then check the NAS authentication log.View AnswerAnswer:...

July 20, 2018 No Comments READ MORE +

What information does the key length provide in an encryption algorithm?

What information does the key length provide in an encryption algorithm?A . the packet sizeB . the number of permutationsC . the hash block sizeD . the cipher block sizeView AnswerAnswer: C

July 19, 2018 No Comments READ MORE +

Which type of firewall can act on the behalf of the end device?

Which type of firewall can act on the behalf of the end device?A . Stateful packetB . ApplicationC . PacketD . ProxyView AnswerAnswer: D

July 17, 2018 No Comments READ MORE +

In which two situations should you use in-band management? (Choose two.)

In which two situations should you use in-band management? (Choose two.)A . when management applications need concurrent access to the deviceB . when you require administrator access from multiple locationsC . when a network device fails to forward packetsD . when you require ROMMON accessE . when the control plane...

July 16, 2018 No Comments READ MORE +

Which three ESP fields can be encrypted during transmission? (Choose three.)

Which three ESP fields can be encrypted during transmission? (Choose three.)A . Security Parameter IndexB . Sequence NumberC . MAC AddressD . PaddingE . Pad LengthF . Next HeaderView AnswerAnswer: D,E,F

July 16, 2018 No Comments READ MORE +

In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?

In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity?A . gratuitous ARPB . ARP poisoningC . IP spoofingD . MAC spoofingView AnswerAnswer: D

July 15, 2018 No Comments READ MORE +

Which two devices are components of the BYOD architectural framework?

Which two devices are components of the BYOD architectural framework?A . Prime InfrastructureB . Nexus 7010 SwitchC . Cisco 3945 RouterD . Wireless Access PointsE . Identity Services EngineView AnswerAnswer: AE

July 15, 2018 No Comments READ MORE +