An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?

An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?A . The switch could offer fake DHCP addresses.B . The switch could become the root bridge.C . The switch could be allowed to join the VTP domain.D . The...

May 13, 2018 No Comments READ MORE +

Which two statements regarding the ASA VPN configurations are correct?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

May 13, 2018 No Comments READ MORE +

Which of the following commands result in a secure bootset? (Choose all that apply.)

Which of the following commands result in a secure bootset? (Choose all that apply.)A . secure boot-setB . secure boot-configC . secure boot-filesD . secure boot-imageView AnswerAnswer: BD

May 11, 2018 No Comments READ MORE +

If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?

If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?A . The interface on both switches may shut downB . STP loops may occurC . The switch with the higher native VLAN may shut downD . The interface with the...

May 10, 2018 No Comments READ MORE +

On which Cisco Configuration Professional screen do you enable AAA

On which Cisco Configuration Professional screen do you enable AAAA . AAA SummaryB . AAA Servers and GroupsC . Authentication PoliciesD . Authorization PoliciesView AnswerAnswer: A

May 9, 2018 No Comments READ MORE +

You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?

You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?A . Create a whitelist...

May 8, 2018 No Comments READ MORE +

Which IOS command do you enter to test authentication against a AAA server?

Which IOS command do you enter to test authentication against a AAA server?A . dialer aaa suffix <suffix> password <password>B . ppp authentication chap pap testC . aaa authentication enable default test group tacacs+D . test aaa-server authentication dialergroup username <user> password.View AnswerAnswer: D

May 4, 2018 No Comments READ MORE +

Which Sourcefire logging action should you choose to record the most detail about a connection?

Which Sourcefire logging action should you choose to record the most detail about a connection?A . Enable logging at the end of the session.B . Enable logging at the beginning of the session.C . Enable alerts via SNMP to log events off-box.D . Enable eStreamer to log events off-box.View AnswerAnswer:...

May 3, 2018 No Comments READ MORE +

Which EAP method uses Protected Access Credentials?

Which EAP method uses Protected Access Credentials?A . EAP-FASTB . EAP-TLSC . EAP-PEAPD . EAP-GTCView AnswerAnswer: A

May 2, 2018 No Comments READ MORE +

Which option is the most effective placement of an IPS device within the infrastructure?

Which option is the most effective placement of an IPS device within the infrastructure?A . Inline, behind the internet router and firewallB . Inline, before the internet router and firewallC . Promiscuously, after the Internet router and before the firewallD . Promiscuously, before the Internet router and the firewallView AnswerAnswer:...

May 1, 2018 No Comments READ MORE +