Which line in this configuration prevents the HelpDesk user from modifying the interface configuration?

Refer to the exhibit. Which line in this configuration prevents the HelpDesk user from modifying the interface configuration?A . Privilege exec level 9 configure terminalB . Privilege exec level 10 interfaceC . Username HelpDesk privilege 6 password helpD . Privilege exec level 7 show start-upView AnswerAnswer: A

June 4, 2018 No Comments READ MORE +

For what reason would you configure multiple security contexts on the ASA firewall?

For what reason would you configure multiple security contexts on the ASA firewall?A . To separate different departments and business units.B . To enable the use of VRFs on routers that are adjacently connected.C . To provide redundancy and high availability within the organization.D . To enable the use of...

June 3, 2018 No Comments READ MORE +

What is a valid implicit permit rule for traffic that is traversing the ASA firewall?

What is a valid implicit permit rule for traffic that is traversing the ASA firewall?A . ARPs in both directions are permitted in transparent mode only.B . Unicast IPv4 traffic from a higher security interface to a lower security interface is permitted in routed mode only.C . Unicast IPv6 traffic...

June 3, 2018 No Comments READ MORE +

Which aaa accounting command is used to enable logging of the start and stop records for user terminal sessions on the router?

Which aaa accounting command is used to enable logging of the start and stop records for user terminal sessions on the router?A . aaa accounting network start-stop tacacs+B . aaa accounting system start-stop tacacs+C . aaa accounting exec start-stop tacacs+D . aaa accounting connection start-stop tacacs+E . aaa accounting commands...

May 31, 2018 No Comments READ MORE +

What can cause the the state table of a stateful firewall to update? (choose two)

What can cause the the state table of a stateful firewall to update? (choose two)A . when a connection is createdB . When a connection’s timer has expired within state tableC . when packet is evaluated against the outbound access list and is deniedD . when outbound packets forwarded to...

May 30, 2018 No Comments READ MORE +

Which option is the resulting action in a zone-based policy firewall configuration with these conditions?

Which option is the resulting action in a zone-based policy firewall configuration with these conditions? A . no impact to zoning or policyB . no policy lookup (pass)C . dropD . apply default policyView AnswerAnswer: C Explanation: http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/sec-zone-pol-fw.html Zone Pairs A zone pair allows you to specify a unidirectional firewall...

May 30, 2018 No Comments READ MORE +

Which option describes information that must be considered when you apply an access list to a physical interface?

Which option describes information that must be considered when you apply an access list to a physical interface?A . Protocol used for filteringB . Direction of the access classC . Direction of the access groupD . Direction of the access listView AnswerAnswer: C

May 30, 2018 No Comments READ MORE +

By which kind of threat is the victim tricked into entering username and password information at a disguised website?

By which kind of threat is the victim tricked into entering username and password information at a disguised website?A . SpoofingB . MalwareC . SpamD . PhishingView AnswerAnswer: D

May 29, 2018 No Comments READ MORE +

Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?

Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?A . FlexConfigB . Device ManagerC . Report ManagerD . Health and Performance MonitorView AnswerAnswer: D

May 27, 2018 No Comments READ MORE +

The first layer of defense which provides real-time preventive solutions against malicious traffic is provided by?

The first layer of defense which provides real-time preventive solutions against malicious traffic is provided by?A . Banyan FiltersB . Explicit FiltersC . Outbreak FiltersView AnswerAnswer: C

May 25, 2018 No Comments READ MORE +