Which two actions do you suggest to fix this issue?

Q53.A university has hired you as a consultant to advise them on the best method to prevent DHCP starvation attacks in the campus. They have already implemented DHCP snooping and port security to control the situation but those do not fully contain the issue. Which two actions do you suggest...

November 12, 2018 No Comments READ MORE +

What action can you take to allow the IPv6 flow records to be sent to the collector?

Refer to the exhibit, Flexible NetFlow is failing to export IPv6 flow records from Router A to your flow collector. What action can you take to allow the IPv6 flow records to be sent to the collector?A . Remove the ip cef command from the configuration.B . Add the ipv6...

November 10, 2018 No Comments READ MORE +

How can this ability be used to assess the posture of the device in ISE?

Q72.Your antivirus server keeps a check on all the clients to ensure that they are updated and run regular scans. In the event that a client falls out of compliance, the antivirus server can integrate with the AD setup to change certain attributes for a user to indicate non-compliance. How...

November 9, 2018 No Comments READ MORE +

Which method is the best way to achieve this connectivity using the Internet as the only transport medium to access the other cloud regions?

Q69.As a managed service provider, you have a multiple environment where your CSRs in different regions that are developed at a cloud provider are terminating VPN tunnels from multiple customers in separate VRFs. Each of the regions has a subnet that is dedicated for the customer and so requires communication...

November 8, 2018 No Comments READ MORE +

Your environment has a large number of network devices that are configured to use AAA for authentication. Additionally, your security policy requires use of 2 Factor Auth or Multi-factor Auth for all device administrators, which you have integrated with ACS, To simplify device management, your organization has purchased Prime Infrastructure, What is the best way to get Prime Infrastructure to authentication to all your network devices?

Your environment has a large number of network devices that are configured to use AAA for authentication. Additionally, your security policy requires use of 2 Factor Auth or Multi-factor Auth for all device administrators, which you have integrated with ACS, To simplify device management, your organization has purchased Prime Infrastructure,...

November 5, 2018 No Comments READ MORE +

Which two statements about Botnet Traffic Filter snooping are true? (Choose two)

Which two statements about Botnet Traffic Filter snooping are true? (Choose two)A . It can log and block suspicious connections from previously unknown bad domains and IP addresses.B . It requires the Cisco ASA DNS server to perform DNS lookups.C . It requires DNS packet inspection to be enable to...

November 4, 2018 No Comments READ MORE +

What would be the possible cause of this failure?

Refer to the exhibit. One of the Windows machines in your network is having connectivity issue by using 802.1X. Windows machines are setup to acquire an IP address from DHCP server configured on the switch, which is supposed to hand out IP address from 50.1.1.0/24 network, and forward AAA requests...

October 26, 2018 No Comments READ MORE +

What would be the possible cause of this failure?

Refer to the exhibit. One of the Windows machines in your network is having connectivity issue by using 802.1X. Windows machines are setup to acquire an IP address from DHCP server configured on the switch, which is supposed to handover IP address from 50.1.1.0/24 network, and forward AAA requests to...

October 23, 2018 No Comments READ MORE +

Q50.Which statement about the Cisco ISR with Cloud Web Security Connector true?

Q50.Which statement about the Cisco ISR with Cloud Web Security Connector true?A . It eliminates the need for separate components such as the Zone-Based Policy Firewall and Cisco IOS IPSB . It can be managed with ScanCenter, which is an intuitive web interface, and a powerful CLIC . It maximizes...

October 23, 2018 No Comments READ MORE +

Which statements about SenderBase reputation scoring on an ESA device is true?

Which statements about SenderBase reputation scoring on an ESA device is true?A . A high score indicates that a message is very likely to be spamB . You can configure a custom score threshold for whitelisting messages.C . Mail with scores in the medium rage can be automatically routed for...

October 21, 2018 1 Comment READ MORE +