Which two commands can protect against this problem?

A rogue device has connected to the network and has become the STP root bridge, which has caused a network availability issue. Which two commands can protect against this problem? (Choose two.)A . switch(config)#spanning-tree portfast bpduguard defaultB . switch(config)#spanning-tree portfast bpdufilter defaultC . switch(config-if)#spanning-tree portfastD . switch(config-if)#spanning-tree portfast disableE ....

July 13, 2018 No Comments READ MORE +

In which two modes is zone-based firewall high availability available? (Choose two.)

In which two modes is zone-based firewall high availability available? (Choose two.)A . IPv4 onlyB . IPv6 onlyC . IPv4 and IPv6D . routed mode onlyE . transparent mode onlyF . both transparent and routed modesView AnswerAnswer: C,D

July 13, 2018 No Comments READ MORE +

access routers?

Which Cisco product provides a GUI-based device management tool to configure Cisco access routers?A . Cisco ASDMB . Cisco CP ExpressC . Cisco ASA 5500D . Cisco CPView AnswerAnswer: D

July 13, 2018 1 Comment READ MORE +

Which statement about Dynamic ARP Inspection is true ?

Which statement about Dynamic ARP Inspection is true ?A . In a typical network, you make all ports as trusted expect for the ports connection to switches , which areuntrustedB . DAI associates a trust state with each switchC . DAI determines the validity of an ARP packet based on...

July 12, 2018 No Comments READ MORE +

Which component does Cisco ASDM require on the host Cisco ASA 5500 Series or Cisco PIX security appliance?

Which component does Cisco ASDM require on the host Cisco ASA 5500 Series or Cisco PIX security appliance?A . a DES or 3DES licenseB . a NAT policy serverC . a SQL databaseD . a Kerberos keyE . a digital certificateView AnswerAnswer: A

July 12, 2018 No Comments READ MORE +

Which function does DNSSEC provide in a DNS infrastructure?

Which function does DNSSEC provide in a DNS infrastructure?A . It authenticates stored information.B . It authorizes stored information.C . It encrypts stored information.D . It logs stored security information.View AnswerAnswer: A

July 7, 2018 No Comments READ MORE +

Which two options are two purposes of the packet-tracer command? (Choose two.)

Which two options are two purposes of the packet-tracer command? (Choose two.)A . to filter and monitor ingress traffic to a switchB . to configure an interface-specific packet traceC . to inject virtual packets into the data pathD . to debug packet drops in a production networkE . to correct...

July 5, 2018 No Comments READ MORE +

What are three of the RBAC views within Cisco IOS Software? (Choose three.)

What are three of the RBAC views within Cisco IOS Software? (Choose three.)A . AdminB . CLIC . RootD . Super AdminE . GuestF . SuperView AnswerAnswer: B,C,F

July 3, 2018 No Comments READ MORE +

Which three statements about transparent firewall are true? ( Choose three)

Which three statements about transparent firewall are true? ( Choose three)A . Transparent firewall works at Layer 2B . Both interfaces must be configured with private IP AddressesC . It can have only a management IP addressD . It does not support dynamic routing protocolsE . It only support PATView...

July 2, 2018 No Comments READ MORE +

When a Cisco ASA is configured in multiple context mode, within which configuration are the interfaces allocated to the security contexts?

When a Cisco ASA is configured in multiple context mode, within which configuration are the interfaces allocated to the security contexts?A . each security contextB . system configurationC . admin context (context with the "admin" role)D . context startup configuration file (.cfg file)View AnswerAnswer: B

June 28, 2018 No Comments READ MORE +