Which statement about Cisco Security Manager form factors is true?
Which statement about Cisco Security Manager form factors is true?A . Cisco Security Manager Professional and Cisco Security Manager UCS Server Bundles support FWSMs.B . Cisco Security Manager Standard and Cisco Security Manager Professional support FWSMs.C . Only Cisco Security Manager Professional supports FWSMs.D . Only Cisco Security Manager Standard...
What is the default behavior of an access list on the Cisco ASA security appliance?
What is the default behavior of an access list on the Cisco ASA security appliance?A . It will permit or deny traffic based on the access-list criteria.B . It will permit or deny all traffic on a specified interface.C . An access group must be configured before the access list...
Which statement about the Cisco ASA configuration is true?
Which statement about the Cisco ASA configuration is true?A . All input traffic on the inside interface is denied by the global ACC . All input and output traffic on the outside interface is denied by the global ACE . ICMP echo-request traffic is permitted from the inside to the...
Which three options correctly identify the Cisco ASA1000V Cloud Firewall? (Choose three.)
Which three options correctly identify the Cisco ASA1000V Cloud Firewall? (Choose three.)A . operates at Layer 2B . operates at Layer 3C . secures tenant edge trafficD . secures intraswitch trafficE . secures data center edge trafficF . replaces Cisco VSGG . complements Cisco VSGH . requires Cisco VSGView AnswerAnswer:...
Which cloud characteristic is used to describes the sharing of physical resource between various entities ?
Which cloud characteristic is used to describes the sharing of physical resource between various entities ?A . ElasticityB . Ubiquitous accessC . MultitenancyD . ResiliencyView AnswerAnswer: C
If you encounter problems logging in to the Cisco Security Manager 4.4 web server or client or backing up its databases, which account has most likely been improperly modified?
If you encounter problems logging in to the Cisco Security Manager 4.4 web server or client or backing up its databases, which account has most likely been improperly modified?A . admin (the default administrator account)B . casuser (the default service account)C . guest (the default guest account)D . user (the...
Which two VPN types can you monitor and control with Cisco Prime Security Manager? (Choose two.)
Which two VPN types can you monitor and control with Cisco Prime Security Manager? (Choose two.)A . AnyConnect SSLB . site-to-siteC . clientless SSLD . IPsec remote-accessView AnswerAnswer: A,D Explanation: http://www.cisco.com/c/en/us/td/docs/security/asacx/9-1/user/guide/ b_User_Guide_for_ASA_CX_and_PRSM_9_1.pdf
When it is configured in accordance to Cisco best practices, the switchport port-security maximum command can mitigate which two types of Layer 2 attacks? (Choose two.)
When it is configured in accordance to Cisco best practices, the switchport port-security maximum command can mitigate which two types of Layer 2 attacks? (Choose two.)A . rogue DHCP serversB . ARP attacksC . DHCP starvationD . MAC spoofingE . CAM attacksF . IP spoofingView AnswerAnswer: C,E
Which three logging methods are supported by Cisco routers? (Choose three.)
Which three logging methods are supported by Cisco routers? (Choose three.)A . console loggingB . TACACS+ loggingC . terminal loggingD . syslog loggingE . ACL loggingF . RADIUS loggingView AnswerAnswer: A,C,D
Which command enables the HTTP server daemon for Cisco ASDM access?
Which command enables the HTTP server daemon for Cisco ASDM access?A . http server enableB . http server enable 443C . crypto key generate rsa modulus 1024D . no http server enableView AnswerAnswer: A