Which statement about the given configuration is true?
Refer to the exhibit. Which statement about the given configuration is true?A . The single-connection command causes the device to establish one connection for all TACACS transactions.B . The single-connection command causes the device to process one TACACS request and then move to the next server.C . The timeout command...
Refer to the above. Which translation technique does this configuration result in?
# nat (inside,outside) dynamic interface Refer to the above. Which translation technique does this configuration result in?A . Static NATB . Dynamic NATC . Dynamic PATD . Twice NATView AnswerAnswer: C
Which description of the nonsecret numbers that are used to start a Diffie-Hellman exchange is true?
Which description of the nonsecret numbers that are used to start a Diffie-Hellman exchange is true?A . They are large pseudorandom numbers.B . They are very small numbers chosen from a table of known valuesC . They are numeric values extracted from hashed system hostnames.D . They are preconfigured prime...
Which IPS mode is less secure than other options but allows optimal network throughput?
Which IPS mode is less secure than other options but allows optimal network throughput?A . Promiscuous modeB . inline modeC . transparent modeD . inline-bypass modeView AnswerAnswer: A Explanation: The recommended IPS deployment mode depends on the goals and policies of the enterprise. IPS inline mode is more secure because...
A proxy firewall protects against which type of attack?
A proxy firewall protects against which type of attack?A . cross-site scripting attackB . worm trafficC . port scanningD . DDoS attacksView AnswerAnswer: A
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?A . file reputationB . file analysisC . signature updatesD . network blockingView AnswerAnswer: A
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)A . AESB . 3DESC . DESD . MD5E . DH-1024F . SHA-384View AnswerAnswer: A,F
Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)
Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)A . Smart tunnels can be used by clients that do not have administrator privilegesB . Smart tunnels support all operating systemsC . Smart tunnels offer better performance than port forwardingD . Smart tunnels require the client to...
Which option is the default value for the DiffieCHellman group when configuring a site-to-site VPN on an ASA device?
Which option is the default value for the DiffieCHellman group when configuring a site-to-site VPN on an ASA device?A . Group 1B . Group 2C . Group 5D . Group 7View AnswerAnswer: B
What features can protect the data plane? (Choose three.)
What features can protect the data plane? (Choose three.)A . policingB . ACLsC . IPSD . antispoofingE . QoSF . DHCP-snoopingView AnswerAnswer: B,D,F