Within an 802.1X enabled network with the Auth Fail feature configured, when does a switch port get placed into a restricted VLAN?
Within an 802.1X enabled network with the Auth Fail feature configured, when does a switch port get placed into a restricted VLAN?A . When 802.1X is not globally enabled on the Cisco catalyst switchB . When AAA new-model is enabledC . When a connected client fails to authenticate after a...
Which statement about the communication between interfaces on the same security level is true?
Which statement about the communication between interfaces on the same security level is true?A . Interfaces on the same security level require additional configuration to permit inter-interface communication.B . Configuring interfaces on the same security level can cause asymmetric routing.C . All traffic is allowed by default between interfaces on...
By default, without any access list configured, which five types of traffic are permitted?
A Cisco ASA appliance has three interfaces configured. The first interface is the inside interface with a security level of 100. The second interface is the DMZ interface with a security level of 50. The third interface is the outside interface with a security level of 0. By default, without...
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?A . nested object-classB . class-mapC . extended wildcard matchingD . object groupsView AnswerAnswer: D Explanation: http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/objectgroups.html Information About Object Groups By grouping like objects together, you can use the object group...
How many crypto map sets can you apply to a router interface?
How many crypto map sets can you apply to a router interface?A . 3B . 2C . 4D . 1View AnswerAnswer: D
Which NAT option is executed first during in case of multiple nat translations?
Which NAT option is executed first during in case of multiple nat translations?A . dynamic nat with shortest prefixB . dynamic nat with longest prefixC . static nat with shortest prefixD . static nat with longest prefixView AnswerAnswer: D
What is the purpose of a honeypot IPS?
What is the purpose of a honeypot IPS?A . To create customized policiesB . To detect unknown attacksC . To normalize streamsD . To collect information about attacksView AnswerAnswer: D
Which alert protocol is used with Cisco IPS Manager Express to support up to 10 sensors?
Which alert protocol is used with Cisco IPS Manager Express to support up to 10 sensors?A . SDEEB . SyslogC . SNMPD . CSMView AnswerAnswer: A
What does the command crypto isakmp nat-traversal do?
What does the command crypto isakmp nat-traversal do?A . Enables udp port 4500 on all IPsec enabled interfacesB . rebooting the ASA the global commandView AnswerAnswer: A
Which IPS mode provides the maximum number of actions?
Which IPS mode provides the maximum number of actions?A . inlineB . promiscuousC . spanD . failoverE . bypassView AnswerAnswer: A