Which two SNMPv3 features ensure that SNMP packets have been sent securely?" Choose two.
Which two SNMPv3 features ensure that SNMP packets have been sent securely?" Choose two.A . host authorizationB . authenticationC . encryptionD . compressionView AnswerAnswer: B,C
What is a required attribute to configure NTP authentication on a Cisco ASA?
What is a required attribute to configure NTP authentication on a Cisco ASA?A . Key IDB . IPsecC . AAAD . IKEv2View AnswerAnswer: A
What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS sessions and HTTPS access?
What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS sessions and HTTPS access?A . sslconfigB . sslciphersC . tlsconifgD . certconfigView AnswerAnswer: A
Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)
Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)A . Enable the EIGRP routing process and specify the AS number.B . Define the EIGRP default-metric.C . Configure the EIGRP router IE . Use the neighbor command(s) to specify the EIGRP neighbors.F ....
Which statement about traffic storm control behavior is true?
Which statement about traffic storm control behavior is true?A . Traffic storm control cannot determine if the packet is unicast or broadcast.B . If you enable broadcast and multicast traffic storm control and the combined broadcast and multicast trafficexceeds the level within a 1 second traffic storm interval, storm control...
Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)
Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)A . NTP authentication is enabled.B . NTP authentication is disabled.C . NTP logging is enabled.D . NTP logging is disabled.E . NTP access is enabled.F . NTP access is disabled.View AnswerAnswer: B,D,E
An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)
An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)A . The configuration will be updated with MAC addresses from traffic seen ingressing the port. The...
Which command captures http traffic from Host A to Server A?
Refer to the exhibit. Server A is a busy server that offers these services: -World Wide Web - DNS Which command captures http traffic from Host A to Server A?A . capture traffic match udp host 10.1.1.150 host 10.2.2.100B . capture traffic match 80 host 10.1.1.150 host 10.2.2.100C . capture...
A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?
A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?A . When the Cisco Unified Communications Manager cluster is in non-secure modeB . When the Cisco Unified Communications Manager cluster...
What are two primary purposes of Layer 2 detection in Cisco IPS networks? (Choose two.)
What are two primary purposes of Layer 2 detection in Cisco IPS networks? (Choose two.)A . identifying Layer 2 ARP attacksB . detecting spoofed MAC addresses and tracking 802.1X actions and data communication after a successfulclient associationC . detecting and preventing MAC address spoofing in switched environmentsD . mitigating man-in-the-middle...