Which statement about this debug output is true?

Refer to the below. Which statement about this debug output is true?A . The requesting authentication request came from username GETUSEC . The TACACS+ authentication request came from a valid user.D . The TACACS+ authentication request passed, but for some reason the user's connection was closed immediately.E . The initiating...

February 27, 2018 No Comments READ MORE +

Which type of encryption technology has the broadcast platform support?

Which type of encryption technology has the broadcast platform support?A . MiddlewareB . HardwareC . SoftwareD . File-levelView AnswerAnswer: C

February 26, 2018 No Comments READ MORE +

While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?A . IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.B . ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.C . IKE version 2 security associations are established...

February 26, 2018 No Comments READ MORE +

Which statement about extended access lists is true?

Which statement about extended access lists is true?A . Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destinationB . Extended access lists perform filtering that is based on source and destination and are most effective when applied to...

February 25, 2018 No Comments READ MORE +

What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)

What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)A . The Internet Key Exchange protocol establishes security associationsB . The Internet Key Exchange protocol provides data confidentialityC . The Internet Key Exchange protocol provides replay detectionD . The Internet Key Exchange protocol is responsible for...

February 23, 2018 No Comments READ MORE +

Which statement is a benefit of using Cisco IOS IPS?

Which statement is a benefit of using Cisco IOS IPS?A . It uses the underlying routing infrastructure to provide an additional layer of security.B . It works in passive mode so as not to impact traffic flow.C . It supports the complete signature database as a Cisco IPS sensor appliance.D...

February 20, 2018 No Comments READ MORE +

A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.

A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.A . Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list.B ....

February 17, 2018 No Comments READ MORE +

Which option is a characteristic of the RADIUS protocol?

Which option is a characteristic of the RADIUS protocol? A. uses TCP B. offers multiprotocol support C. combines authentication and authorization in one process D. supports bi-directional challengeView AnswerAnswer: C Explanation: http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml Authentication and Authorization RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the...

February 17, 2018 No Comments READ MORE +

Which type of PVLAN port allows a host in the same VLAN to communicate only with promiscuous hosts?

Which type of PVLAN port allows a host in the same VLAN to communicate only with promiscuous hosts?A . Community host in the PVLANB . Isolated host in the PVLANC . Promiscuous host in the PVLAND . Span for host in the PVLANView AnswerAnswer: B

February 17, 2018 No Comments READ MORE +

Which 2 NAT type allows only objects or groups to reference an IP address?

Which 2 NAT type allows only objects or groups to reference an IP address?A . dynamic NATB . dynamic PATC . static NATD . identity NATView AnswerAnswer: AC Explanation: http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/nat_objects.html#18425

February 17, 2018 No Comments READ MORE +