What is the effect of the ASA command crypto isakmp nat-traversal?

What is the effect of the ASA command crypto isakmp nat-traversal?A . It opens port 4500 only on the outside interface.B . It opens port 500 only on the inside interface.C . It opens port 500 only on the outside interface.D . It opens port 4500 on all interfaces that...

April 26, 2018 No Comments READ MORE +

computer that is disconnected from the network?

What’s the technology that you can use to prevent non malicious program to run in the computer that is disconnected from the network?A . FirewallB . Software AntivirusC . Network IPSD . Host IPView AnswerAnswer: D

April 26, 2018 No Comments READ MORE +

What VPN feature allows traffic to exit the security appliance through the same interface it entered?

What VPN feature allows traffic to exit the security appliance through the same interface it entered?A . hairpinningB . NATC . NAT traversalD . split tunnelingView AnswerAnswer: A

April 25, 2018 No Comments READ MORE +

what causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network?

what causes a client to be placed in a guest or restricted VLAN on an 802.1x enabled network?A . client entered wrong credentials multiple times.B . client entered wrong credentials First time.View AnswerAnswer: A

April 25, 2018 No Comments READ MORE +

How can you proect CDP from reconnaissance attacks?

How can you proect CDP from reconnaissance attacks?A . Enable dot1x on all ports that are connected to other switches.B . Disable CDP on ports connected to endpoints.C . Disbale CDP on trunk ports.D . Enable dynamic ARP inspection on all untrusted ports.View AnswerAnswer: B

April 23, 2018 No Comments READ MORE +

Protocols supported in contest aware VRF over VRF lite?

Protocols supported in contest aware VRF over VRF lite? Choose TwoA . EIGRPB . MulticastC . CGRView AnswerAnswer: AB

April 22, 2018 No Comments READ MORE +

Which wildcard mask is associated with a subnet mask of /27?

Which wildcard mask is associated with a subnet mask of /27?A . 0.0.0.31B . 0.0.027C . 0.0.0.224D . 0.0.0.255View AnswerAnswer: A

April 21, 2018 No Comments READ MORE +

Which two characteristics of symmetric encryption are true? (Choose two)

Which two characteristics of symmetric encryption are true? (Choose two)A . It uses digital certificates.B . It uses a public key and a private key to encrypt and decrypt traffic.C . it requires more resources than asymmetric encryptionD . it is faster than asymmetric encryptionE . It uses the same...

April 20, 2018 1 Comment READ MORE +

What is the transition order of STP states on a Layer 2 switch interface?

What is the transition order of STP states on a Layer 2 switch interface?A . listening, learning, blocking, forwarding, disabledB . listening, blocking, learning, forwarding, disabledC . blocking, listening, learning, forwarding, disabledD . forwarding, listening, learning, blocking, disabledView AnswerAnswer: C

April 19, 2018 No Comments READ MORE +

Which two features are commonly used CoPP and CPPr to protect the control plane? (Choose two.)

Which two features are commonly used CoPP and CPPr to protect the control plane? (Choose two.)A . QoSB . traffic classificationC . access listsD . policy mapsE . class mapsF . Cisco Express ForwardingView AnswerAnswer: A,B

April 17, 2018 No Comments READ MORE +