Which two statements about Cisco IDS are true? (Choose two.)
Which two statements about Cisco IDS are true? (Choose two.)A . It is preferred for detection-only deployment.B . It is used for installations that require strong network-based protection and that include sensor tuning.C . It is used to boost sensor sensitivity at the expense of false positives.D . It is...
For which purpose is the Cisco ASA CLI command aaa authentication match used?
For which purpose is the Cisco ASA CLI command aaa authentication match used?A . Enable authentication for SSH and Telnet connections to the Cisco ASA appliance.B . Enable authentication for console connections to the Cisco ASA appliance.C . Enable authentication for connections through the Cisco ASA appliance.D . Enable authentication...
Which command is the first that you enter to check whether or not ASDM is installed on the ASA?
Which command is the first that you enter to check whether or not ASDM is installed on the ASA?A . Show ipB . Show running-config asdmC . Show running-config bootD . Show versionE . Show routeView AnswerAnswer: D
Which Cisco switch technology prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast flood on a port?
Which Cisco switch technology prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast flood on a port?A . port securityB . storm controlC . dynamic ARP inspectionD . BPDU guardE . root guardF . dot1xView AnswerAnswer: B
ASA general management plane hardening ?
Which two option are protocol and tools are used by management plane when using cisco ASA general management plane hardening ?A . Unicast Reverse Path ForwardingB . NetFlowC . Routing Protocol AuthenticationD . Threat detectionE . SyslogF . ICMP unreachablesG . Cisco URL FilteringView AnswerAnswer: B,E Explanation: http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html
At which layer does MACsecprovide encryption?
At which layer does MACsecprovide encryption?A . Layer 1B . Layer 2C . Layer 3D . Layer 4View AnswerAnswer: B
What are two high-level task areas in a Cisco Prime Infrastructure life-cycle workflow? (Choose two.)
What are two high-level task areas in a Cisco Prime Infrastructure life-cycle workflow? (Choose two.)A . DesignB . OperateC . MaintainD . LogE . EvaluateView AnswerAnswer: A,B
If the Cisco ASA 1000V has too few licenses, what is its behavior?
If the Cisco ASA 1000V has too few licenses, what is its behavior?A . It drops all traffic.B . It drops all outside-to-inside packets.C . It drops all inside-to-outside packets.D . It passes the first outside-to-inside packet and drops all remaining packets.View AnswerAnswer: D
Which statement about this access list is true?
Refer to the exhibit. Which statement about this access list is true?A . This access list does not work without 6to4 NATB . IPv6 to IPv4 traffic permitted on the Cisco ASA by defaultC . This access list is valid and works without additional configurationD . This access list is...
Which command captures http traffic from Host A to Server A?
Refer to the exhibit. Server A is a busy server that offers these services: -World Wide Web - DNS Which command captures http traffic from Host A to Server A?A . capture traffic match udp host 10.1.1.150 host 10.2.2.100B . capture traffic match 80 host 10.1.1.150 host 10.2.2.100C . capture...