Which two actions can a zone-based firewall take when looking at traffic? (Choose two)
Which two actions can a zone-based firewall take when looking at traffic? (Choose two)A . FilterB . ForwardC . DropD . BroadcastE . InspectView AnswerAnswer: CE
The Admin user is unable to enter configuration mode on a device with the given configuration. What change can you make to the configuration to correct the problem?
Refer to the exhibit. The Admin user is unable to enter configuration mode on a device with the given configuration. What change can you make to the configuration to correct the problem?A . Remove the autocommand keyword and arguments from the username admin privilege line.B . Change the Privilege exec level value...
In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?
In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?A . phishingB . pharmingC . solicitationD . secure transactionView AnswerAnswer: A
While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPSec Phase 1 is down due to...
How to verify that TACACS+ connectivity to a device?
How to verify that TACACS+ connectivity to a device?A . You successfully log in to the device by using the local credentials.B . You connect to the device using SSH and receive the login prompt.C . You successfully log in to the device by using ACS credentials.D . You connect...
While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10.10.2.B . IKE Phase 1 main mode has successfully negotiated between 10.1.1.5...
What IPSec mode is used to encrypt traffic between a server and VPN endpoint?
What IPSec mode is used to encrypt traffic between a server and VPN endpoint?A . tunnelB . TrunkC . AggregatedD . QuickE . TransportView AnswerAnswer: E
What command can you use to verify the binding table status?
What command can you use to verify the binding table status?A . show ip dhcp snooping databaseB . show ip dhcp snooping bindingC . show ip dhcp snooping statisticsD . show ip dhcp poolE . show ip dhcp source bindingF . show ip dhcp snoopingView AnswerAnswer: A
Which of the following pairs of statements is true in terms of configuring MD authentication?
Which of the following pairs of statements is true in terms of configuring MD authentication?A . Interface statements (OSPF, EIGRP) must be configured; use of key chain in OSPFB . Router process (OSPF, EIGRP) must be configured; key chain in EIGRPC . Router process (only for OSPF) must be configured;...
What type of firewall would use the given configuration line?
Refer to the exhibit. What type of firewall would use the given configuration line?A . a stateful firewallB . a personal firewallC . a proxy firewallD . an application firewallE . a stateless firewallView AnswerAnswer: A