What port option in a PVLAN that can communicate with every other ports…

What port option in a PVLAN that can communicate with every other ports…A . promiscousView AnswerAnswer: A

February 16, 2018 No Comments READ MORE +

When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class? (Choose three.)

When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a traffic class? (Choose three.)A . passB . policeC . inspectD . dropE . queueF . shapeView AnswerAnswer: A, C, D Explanation: http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml Zone-Based Policy Firewall Actions ZFW provides three actions for traffic that traverses...

February 15, 2018 No Comments READ MORE +

What is a possible reason for the error message?Router(config)#aaa server?% Unrecognized command

What is a possible reason for the error message?Router(config)#aaa server?% Unrecognized commandA . The command syntax requires a space after the word “server”B . The command is invalid on the target deviceC . The router is already running the latest operating systemD . The router is a new device on...

February 15, 2018 No Comments READ MORE +

Security well known terms Choose 2

Security well known terms Choose 2A . TrojanB . PhishingC . Something LCD . RansomwareView AnswerAnswer: BD

February 11, 2018 No Comments READ MORE +

Which type of mirroring does SPAN technology perform?

Which type of mirroring does SPAN technology perform?A . Remote mirroring over Layer 2B . Remote mirroring over Layer 3C . Local mirroring over Layer 2D . Local mirroring over Layer 3View AnswerAnswer: C

February 11, 2018 No Comments READ MORE +

Which two characteristics of an application layer firewall are true? (Choose two)

Which two characteristics of an application layer firewall are true? (Choose two)A . provides protection for multiple applicationsB . is immune to URL manipulationC . provides reverse proxy servicesD . provides stateful firewall functionalityE . has low processor usageView AnswerAnswer: AC

February 9, 2018 No Comments READ MORE +

When a company puts a security policy in place, what is the effect on the company’s business?

When a company puts a security policy in place, what is the effect on the company’s business?A . Minimizing riskB . Minimizing total cost of ownershipC . Minimizing liabilityD . Maximizing complianceView AnswerAnswer: A

February 8, 2018 No Comments READ MORE +

Which two statements about the self zone on a Cisco zone-based policy firewall are true? (Choose Two)

Which two statements about the self zone on a Cisco zone-based policy firewall are true? (Choose Two)A . Multiple interfaces can be assigned to the self zone.B . Traffic entering the self zone must match a rule.C . Zone pairs that include the self zone apply to traffic transiting the...

February 6, 2018 No Comments READ MORE +

What configuration allows AnyConnect to automatically establish a VPN session when a user logs in to the computer?

What configuration allows AnyConnect to automatically establish a VPN session when a user logs in to the computer?A . always-onB . proxyC . transparent modeD . Trusted Network DetectionView AnswerAnswer: A

February 5, 2018 No Comments READ MORE +

You have configured R1 and R2 as shown, but the routers are unable to establish a site-to-site VPN tunnel. What action can you take to correct the problem?

Refer to the exhibit. You have configured R1 and R2 as shown, but the routers are unable to establish a site-to-site VPN tunnel. What action can you take to correct the problem?A . Edit the crypto keys on R1 and R2 to match.B . Edit the ISAKMP policy sequence numbers...

February 2, 2018 No Comments READ MORE +