Which statement about this debug output is true?
Refer to the below. Which statement about this debug output is true?A . The requesting authentication request came from username GETUSEC . The TACACS+ authentication request came from a valid user.D . The TACACS+ authentication request passed, but for some reason the user's connection was closed immediately.E . The initiating...
Which type of encryption technology has the broadcast platform support?
Which type of encryption technology has the broadcast platform support?A . MiddlewareB . HardwareC . SoftwareD . File-levelView AnswerAnswer: C
While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto ipsec sa command. What does the given output show?A . IPSec Phase 2 is established between 10.1.1.1 and 10.1.1.5.B . ISAKMP security associations are established between 10.1.1.5 and 10.1.1.1.C . IKE version 2 security associations are established...
Which statement about extended access lists is true?
Which statement about extended access lists is true?A . Extended access lists perform filtering that is based on source and destination and are most effective when applied to the destinationB . Extended access lists perform filtering that is based on source and destination and are most effective when applied to...
What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)
What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)A . The Internet Key Exchange protocol establishes security associationsB . The Internet Key Exchange protocol provides data confidentialityC . The Internet Key Exchange protocol provides replay detectionD . The Internet Key Exchange protocol is responsible for...
Which statement is a benefit of using Cisco IOS IPS?
Which statement is a benefit of using Cisco IOS IPS?A . It uses the underlying routing infrastructure to provide an additional layer of security.B . It works in passive mode so as not to impact traffic flow.C . It supports the complete signature database as a Cisco IPS sensor appliance.D...
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.A . Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list.B ....
Which option is a characteristic of the RADIUS protocol?
Which option is a characteristic of the RADIUS protocol? A. uses TCP B. offers multiprotocol support C. combines authentication and authorization in one process D. supports bi-directional challengeView AnswerAnswer: C Explanation: http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a0080094e99.shtml Authentication and Authorization RADIUS combines authentication and authorization. The access-accept packets sent by the RADIUS server to the...
Which type of PVLAN port allows a host in the same VLAN to communicate only with promiscuous hosts?
Which type of PVLAN port allows a host in the same VLAN to communicate only with promiscuous hosts?A . Community host in the PVLANB . Isolated host in the PVLANC . Promiscuous host in the PVLAND . Span for host in the PVLANView AnswerAnswer: B
Which 2 NAT type allows only objects or groups to reference an IP address?
Which 2 NAT type allows only objects or groups to reference an IP address?A . dynamic NATB . dynamic PATC . static NATD . identity NATView AnswerAnswer: AC Explanation: http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/nat_objects.html#18425