Which statement about a PVLAN isolated port configured on a switch is true?

Which statement about a PVLAN isolated port configured on a switch is true?A . The isolated port can communicate only with the promiscuous port.B . The isolated port can communicate with other isolated ports and the promiscuous port.C . The isolated port can communicate only with community ports.D . The...

January 8, 2020 No Comments READ MORE +

In which two situations should you use out-of-band management? (Choose two.)

In which two situations should you use out-of-band management? (Choose two.)A . when a network device fails to forward packetsB . when you require ROMMON accessC . when management applications need concurrent access to the deviceD . when you require administrator access from multiple locationsE . when the control plane...

January 7, 2020 No Comments READ MORE +

According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network?

According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)A . BOOTPB . TFTPC . DNSD . MABE . HTTPF . 802.1xView AnswerAnswer: A,B,C Explanation: ACLs are...

January 7, 2020 No Comments READ MORE +

Which two services define cloud networks? (Choose two.)

Which two services define cloud networks? (Choose two.)A . Infrastructure as a ServiceB . Platform as a ServiceC . Security as a ServiceD . Compute as a ServiceE . Tenancy as a ServiceView AnswerAnswer: AB Explanation: The NIST's definition of cloud computing defines the service models as follows:[2] + Software...

January 7, 2020 No Comments READ MORE +

Which EAP method uses Protected Access Credentials?

Which EAP method uses Protected Access Credentials?A . EAP-FASTB . EAP-TLSC . EAP-PEAPD . EAP-GTCView AnswerAnswer: A Explanation: Flexible Authentication via Secure Tunneling (EAP-FAST) is a protocol proposal by Cisco Systems as a replacement for LEAP. The protocol was designed to address the weaknesses of LEAP while preserving the "lightweight"...

January 6, 2020 No Comments READ MORE +

What are two default Cisco IOS privilege levels? (Choose two.)

What are two default Cisco IOS privilege levels? (Choose two.)A . 0B . 1C . 5D . 7E . 10F . 15View AnswerAnswer: B,F Explanation: By default, the Cisco IOS software command-line interface (CLI) has two levels of access to commands: user EXEC mode (level 1) and privileged EXEC mode...

January 6, 2020 No Comments READ MORE +

Which option describes information that must be considered when you apply an access list to a physical interface?

Which option describes information that must be considered when you apply an access list to a physical interface?A . Protocol used for filteringB . Direction of the access classC . Direction of the access groupD . Direction of the access listView AnswerAnswer: C Explanation: Applying an Access List to an...

January 6, 2020 No Comments READ MORE +

In a security context, which action can you take to address compliance?

In a security context, which action can you take to address compliance?A . Implement rules to prevent a vulnerability.B . Correct or counteract a vulnerability.C . Reduce the severity of a vulnerability.D . Follow directions from the security appliance manufacturer to remediate a vulnerability.View AnswerAnswer: A Explanation: In general, compliance...

January 6, 2020 No Comments READ MORE +

When users login to the Clientless SSLVPN using https://209.165.201.2/test, which group policy will be applied?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

January 6, 2020 No Comments READ MORE +

Which three ESP fields can be encrypted during transmission? (Choose three.)

Which three ESP fields can be encrypted during transmission? (Choose three.)A . Security Parameter IndexB . Sequence NumberC . MAC AddressD . PaddingE . Pad LengthF . Next HeaderView AnswerAnswer: D,E,F Explanation: The packet begins with two 4-byte fields (Security Parameters Index (SPI) and Sequence Number). Following these fields is...

January 5, 2020 No Comments READ MORE +