What is the effect of the ASA command crypto isakmp nat-traversal?
What is the effect of the ASA command crypto isakmp nat-traversal?A . It opens port 4500 only on the outside interface.B . It opens port 500 only on the inside interface.C . It opens port 500 only on the outside interface.D . It opens port 4500 on all interfaces that...
computer that is disconnected from the network?
What’s the technology that you can use to prevent non malicious program to run in the computer that is disconnected from the network?A . FirewallB . Software AntivirusC . Network IPSD . Host IPView AnswerAnswer: D
What VPN feature allows traffic to exit the security appliance through the same interface it entered?
What VPN feature allows traffic to exit the security appliance through the same interface it entered?A . hairpinningB . NATC . NAT traversalD . split tunnelingView AnswerAnswer: A
what causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network?
what causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network?A . client entered wrong credentials multiple times.B . client entered wrong credentials First time.View AnswerAnswer: A
How can you proect CDP from reconnaissance attacks?
How can you proect CDP from reconnaissance attacks?A . Enable dot1x on all ports that are connected to other switches.B . Disable CDP on ports connected to endpoints.C . Disbale CDP on trunk ports.D . Enable dynamic ARP inspection on all untrusted ports.View AnswerAnswer: B
Protocols supported in contest aware VRF over VRF lite?
Protocols supported in contest aware VRF over VRF lite? Choose TwoA . EIGRPB . MulticastC . CGRView AnswerAnswer: AB
Which wildcard mask is associated with a subnet mask of /27?
Which wildcard mask is associated with a subnet mask of /27?A . 0.0.0.31B . 0.0.027C . 0.0.0.224D . 0.0.0.255View AnswerAnswer: A
Which two characteristics of symmetric encryption are true? (Choose two)
Which two characteristics of symmetric encryption are true? (Choose two)A . It uses digital certificates.B . It uses a public key and a private key to encrypt and decrypt traffic.C . it requires more resources than asymmetric encryptionD . it is faster than asymmetric encryptionE . It uses the same...
What is the transition order of STP states on a Layer 2 switch interface?
What is the transition order of STP states on a Layer 2 switch interface?A . listening, learning, blocking, forwarding, disabledB . listening, blocking, learning, forwarding, disabledC . blocking, listening, learning, forwarding, disabledD . forwarding, listening, learning, blocking, disabledView AnswerAnswer: C
Which two features are commonly used CoPP and CPPr to protect the control plane? (Choose two.)
Which two features are commonly used CoPP and CPPr to protect the control plane? (Choose two.)A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B