Which line in this configuration prevents the HelpDesk user from modifying the interface configuration?
Refer to the exhibit. Which line in this configuration prevents the HelpDesk user from modifying the interface configuration?A . Privilege exec level 9 configure terminalB . Privilege exec level 10 interfaceC . Username HelpDesk privilege 6 password helpD . Privilege exec level 7 show start-upView AnswerAnswer: A
For what reason would you configure multiple security contexts on the ASA firewall?
For what reason would you configure multiple security contexts on the ASA firewall?A . To separate different departments and business units.B . To enable the use of VRFs on routers that are adjacently connected.C . To provide redundancy and high availability within the organization.D . To enable the use of...
What is a valid implicit permit rule for traffic that is traversing the ASA firewall?
What is a valid implicit permit rule for traffic that is traversing the ASA firewall?A . ARPs in both directions are permitted in transparent mode only.B . Unicast IPv4 traffic from a higher security interface to a lower security interface is permitted in routed mode only.C . Unicast IPv6 traffic...
Which aaa accounting command is used to enable logging of the start and stop records for user terminal sessions on the router?
Which aaa accounting command is used to enable logging of the start and stop records for user terminal sessions on the router?A . aaa accounting network start-stop tacacs+B . aaa accounting system start-stop tacacs+C . aaa accounting exec start-stop tacacs+D . aaa accounting connection start-stop tacacs+E . aaa accounting commands...
What can cause the the state table of a stateful firewall to update? (choose two)
What can cause the the state table of a stateful firewall to update? (choose two)A . when a connection is createdB . When a connection’s timer has expired within state tableC . when packet is evaluated against the outbound access list and is deniedD . when outbound packets forwarded to...
Which option is the resulting action in a zone-based policy firewall configuration with these conditions?
Which option is the resulting action in a zone-based policy firewall configuration with these conditions? A . no impact to zoning or policyB . no policy lookup (pass)C . dropD . apply default policyView AnswerAnswer: C Explanation: http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_zbf/configuration/xe-3s/sec-zone-pol-fw.html Zone Pairs A zone pair allows you to specify a unidirectional firewall...
Which option describes information that must be considered when you apply an access list to a physical interface?
Which option describes information that must be considered when you apply an access list to a physical interface?A . Protocol used for filteringB . Direction of the access classC . Direction of the access groupD . Direction of the access listView AnswerAnswer: C
By which kind of threat is the victim tricked into entering username and password information at a disguised website?
By which kind of threat is the victim tricked into entering username and password information at a disguised website?A . SpoofingB . MalwareC . SpamD . PhishingView AnswerAnswer: D
Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?
Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?A . FlexConfigB . Device ManagerC . Report ManagerD . Health and Performance MonitorView AnswerAnswer: D
The first layer of defense which provides real-time preventive solutions against malicious traffic is provided by?
The first layer of defense which provides real-time preventive solutions against malicious traffic is provided by?A . Banyan FiltersB . Explicit FiltersC . Outbreak FiltersView AnswerAnswer: C