What can an administrator do to simultaneously capture and trace packets in a Cisco ASA?
What can an administrator do to simultaneously capture and trace packets in a Cisco ASA? A. Install a Cisco ASA virtual appliance. B. Use the trace option of the capture command. C. Use the trace option of the packet-tracer command. D. Install a switch with a code that supports capturing,...
Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?
Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?A . Enable DNS snooping, traffic classification, and actions.B . Botnet Traffic Filtering is not supported in transparent mode.C . Enable the use of the...
Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall?
Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall?A . packet tracerB . pingC . tracerouteD . SNMP walkView AnswerAnswer: A
Which function in the Cisco ADSM ACL Manager pane allows an administrator to search for a specfic element?
Which function in the Cisco ADSM ACL Manager pane allows an administrator to search for a specfic element?A . FindB . Device ManagementC . SearchD . Device SetupView AnswerAnswer: A
Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?
Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?A . complex threat detectionB . scanning threat detectionC . basic threat detectionD . advanced threat detectionView AnswerAnswer: B
IPv6 addresses in an organization's network are assigned using Stateless Address Autoconfiguration. What is a security concern of using SLAAC for IPv6 address assignment?
IPv6 addresses in an organization's network are assigned using Stateless Address Autoconfiguration. What is a security concern of using SLAAC for IPv6 address assignment?A . Man-In-The-Middle attacks or traffic interception using spoofed IPv6 Router AdvertisementsB . Smurf or amplification attacks using spoofed IPv6 ICMP Neighbor SolicitationsC . Denial of service...
Where on a firewall does an administrator assign interfaces to contexts?
Where on a firewall does an administrator assign interfaces to contexts?A . in the system execution spaceB . in the admin contextC . in a user-defined contextD . in the consoleView AnswerAnswer: A
Which two router commands enable NetFlow on an interface? (Choose two.)
Which two router commands enable NetFlow on an interface? (Choose two.)A . ip flow ingressB . ip flow egressC . ip route-cache flow infer-fieldsD . ip flow ingress infer-fieldsE . ip flow-export version 9View AnswerAnswer: A,B
When you set a Cisco IOS Router as an SSH server, which command specifies the RSA public key of the remote peer when you set the SSH server to perform RSA-based authentication?
When you set a Cisco IOS Router as an SSH server, which command specifies the RSA public key of the remote peer when you set the SSH server to perform RSA-based authentication?A . router(config-ssh-pubkey-user)#keyB . router(conf-ssh-pubkey-user)#key-stringC . router(config-ssh-pubkey)#key-stringD . router(conf-ssh-pubkey-user)#key-string enable sshView AnswerAnswer: B
A network printer has a DHCP server service that cannot be disabled. How can a layer 2 switch be configured to prevent the printer from causing network issues?
A network printer has a DHCP server service that cannot be disabled. How can a layer 2 switch be configured to prevent the printer from causing network issues?A . Remove the ip helper-addressB . Configure a Port-ACL to block outbound TCP port 68C . Configure DHCP snoopingD . Configure port-securityView...