Which statement about the given configuration is true?

Refer to the exhibit. Which statement about the given configuration is true?A . The single-connection command causes the device to establish one connection for all TACACS transactions.B . The single-connection command causes the device to process one TACACS request and then move to the next server.C . The timeout command...

June 24, 2018 No Comments READ MORE +

Refer to the above. Which translation technique does this configuration result in?

# nat (inside,outside) dynamic interface Refer to the above. Which translation technique does this configuration result in?A . Static NATB . Dynamic NATC . Dynamic PATD . Twice NATView AnswerAnswer: C

June 23, 2018 No Comments READ MORE +

Which description of the nonsecret numbers that are used to start a Diffie-Hellman exchange is true?

Which description of the nonsecret numbers that are used to start a Diffie-Hellman exchange is true?A . They are large pseudorandom numbers.B . They are very small numbers chosen from a table of known valuesC . They are numeric values extracted from hashed system hostnames.D . They are preconfigured prime...

June 21, 2018 No Comments READ MORE +

Which IPS mode is less secure than other options but allows optimal network throughput?

Which IPS mode is less secure than other options but allows optimal network throughput?A . Promiscuous modeB . inline modeC . transparent modeD . inline-bypass modeView AnswerAnswer: A Explanation: The recommended IPS deployment mode depends on the goals and policies of the enterprise. IPS inline mode is more secure because...

June 21, 2018 No Comments READ MORE +

A proxy firewall protects against which type of attack?

A proxy firewall protects against which type of attack?A . cross-site scripting attackB . worm trafficC . port scanningD . DDoS attacksView AnswerAnswer: A

June 20, 2018 No Comments READ MORE +

Which technology can be used to rate data fidelity and to provide an authenticated hash for data?

Which technology can be used to rate data fidelity and to provide an authenticated hash for data?A . file reputationB . file analysisC . signature updatesD . network blockingView AnswerAnswer: A

June 19, 2018 No Comments READ MORE +

Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)

Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)A . AESB . 3DESC . DESD . MD5E . DH-1024F . SHA-384View AnswerAnswer: A,F

June 18, 2018 No Comments READ MORE +

Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)

Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)A . Smart tunnels can be used by clients that do not have administrator privilegesB . Smart tunnels support all operating systemsC . Smart tunnels offer better performance than port forwardingD . Smart tunnels require the client to...

June 18, 2018 No Comments READ MORE +

Which option is the default value for the DiffieCHellman group when configuring a site-to-site VPN on an ASA device?

Which option is the default value for the DiffieCHellman group when configuring a site-to-site VPN on an ASA device?A . Group 1B . Group 2C . Group 5D . Group 7View AnswerAnswer: B

June 16, 2018 No Comments READ MORE +

What features can protect the data plane? (Choose three.)

What features can protect the data plane? (Choose three.)A . policingB . ACLsC . IPSD . antispoofingE . QoSF . DHCP-snoopingView AnswerAnswer: B,D,F

June 14, 2018 No Comments READ MORE +