If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...
What is the transition order of STP states on a Layer 2 switch interface?
What is the transition order of STP states on a Layer 2 switch interface?A . listening, learning, blocking, forwarding, disabledB . listening, blocking, learning, forwarding, disabledC . blocking, listening, learning, forwarding, disabledD . forwarding, listening, learning, blocking, disabledView AnswerAnswer: C Explanation: STP switch port states: + Blocking - A port...
Which statement about application blocking is true?
Which statement about application blocking is true?A . It blocks access to specific programs.B . It blocks access to files with specific extensions.C . It blocks access to specific network addresses.D . It blocks access to specific network services.View AnswerAnswer: A Explanation: How do you block unknown applications on Cisco...
Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)
Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)A . Smart tunnels can be used by clients that do not have administrator privilegesB . Smart tunnels support all operating systemsC . Smart tunnels offer better performance than port forwardingD . Smart tunnels require the client to...
What action can you take to allow the user access to the IP address?
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address?A . Create a whitelist...
Which type of firewall can act on the behalf of the end device?
Which type of firewall can act on the behalf of the end device?A . Stateful packetB . ApplicationC . PacketD . ProxyView AnswerAnswer: D Explanation: Application firewalls, as indicated by the name, work at Layer 7, or the application layer of the OSI model. These devices act on behalf of...
Which source port does IKE use when NAT has been detected between two VPN gateways?
Which source port does IKE use when NAT has been detected between two VPN gateways?A . TCP 4500B . TCP 500C . UDP 4500D . UDP 500View AnswerAnswer: C Explanation: The IKE protocol uses UDP packets, usually on port 500 NAT traversal: The encapsulation of IKE and ESP in UDP...
Which statements about reflexive access lists are true? (Choose three.)
Which statements about reflexive access lists are true? (Choose three.)A . Reflexive access lists create a permanent ACEB . Reflexive access lists approximate session filtering using the established keywordC . Reflexive access lists can be attached to standard named IP ACLsD . Reflexive access lists support UDP sessionsE . Reflexive...
What type of packet creates and performs network operations on a network device?
What type of packet creates and performs network operations on a network device?A . control plane packetsB . data plane packetsC . management plane packetsD . services plane packetsView AnswerAnswer: A Explanation: To send the valid key and to authenticate information from the local host to the peer, use the...
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...