Which three commands can be used to harden a switch? (Choose three.)
Which three commands can be used to harden a switch? (Choose three.)A . switch(config-if)# spanning-tree bpdufilter enableB . switch(config)# ip dhcp snoopingC . switch(config)# errdisable recovery interval 900D . switch(config-if)# spanning-tree guard rootE . switch(config-if)# spanning-tree bpduguard disableF . switch(config-if)# no cdp enableView AnswerAnswer: B,D,F
Which statement about Cisco IPS Manager Express is true?
Which statement about Cisco IPS Manager Express is true?A . It provides basic device management for large-scale deployments.B . It provides a GUI for configuring IPS sensors and security modules.C . It enables communication with Cisco ASA devices that have no administrative access.D . It provides greater security than simple...
All 30 users on a single floor of a building are complaining about network slowness. After investigating the access switch, the network administrator notices that the MAC address table is full (10,000 entries) and all traffic is being flooded out of every port. Which action can the administrator take to prevent this from occurring?
All 30 users on a single floor of a building are complaining about network slowness. After investigating the access switch, the network administrator notices that the MAC address table is full (10,000 entries) and all traffic is being flooded out of every port. Which action can the administrator take to...
Which configuration keyword will configure SNMPv3 with authentication but no encryption?
Which configuration keyword will configure SNMPv3 with authentication but no encryption?A . AuthB . PrivC . No authD . Auth privView AnswerAnswer: A
A Cisco ASA is configured in multiple context mode and has two user-defined contexts-Context_A and Context_B. From which context are device logging messages sent?
A Cisco ASA is configured in multiple context mode and has two user-defined contexts-Context_A and Context_B. From which context are device logging messages sent?A . AdminB . Context_AC . Context_BD . SystemView AnswerAnswer: A
Which log level provides the most detail on the Cisco Web Security Appliance?
Which log level provides the most detail on the Cisco Web Security Appliance?A . DebugB . CriticalC . TraceD . InformationalView AnswerAnswer: C
To which port does a firewall send secure logging messages?
To which port does a firewall send secure logging messages?A . TCP/1500B . UDP/1500C . TCP/500D . UDP/500View AnswerAnswer: A
Which kind of Layer 2 attack targets the STP root bridge election process and allows an attacker to control the flow of traffic?
Which kind of Layer 2 attack targets the STP root bridge election process and allows an attacker to control the flow of traffic?A . man-in-the-middleB . denial of serviceC . distributed denial of serviceD . CAM overflowView AnswerAnswer: A
Which statement describes how to set these access levels?
You are the administrator of a Cisco ASA 9.0 firewall and have been tasked with ensuring that the Firewall Admins Active Directory group has full access to the ASA configuration. The Firewall Operators Active Directory group should have a more limited level of access. Which statement describes how to set...
What is the default behavior of NAT control on Cisco ASA Software Version 8.3?
What is the default behavior of NAT control on Cisco ASA Software Version 8.3?A . NAT control has been deprecated on Cisco ASA Software Version 8.3.B . It will prevent traffic from traversing from one enclave to the next without proper access configuration.C . It will allow traffic to traverse...