which of the following authentication protocols is supp…
In which of the following authentication protocols is support for TLS 1.2 specifically required? (Select the best
answer.)
Which of the following is most likely the problem?
The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You
issue the following commands on Router1:
interface serial 0/0 ip ospf
messagedigestkey 1 md5 b0s0n router
ospf 1routerid 1.1.1.1 network
10.10.10.0 0.0.0.255 area 1 network
192.168.51.48 0.0.0.3 area 0 area 0
authentication
You issue the following commands on Router2:
interface serial 0/0 ip ospf
authenticationkey b0s0n router
ospf 2routerid 2.2.2.2 network10.10.20.0 0.0.0.255 area 2
network 192.168.51.48 0.0.0.3
area 0 area 0 authentication
Router1 and Router2 do not form an OSPF adjacency.
Which of the following is most likely the problem? (Select the best answer.)
Which of the following phishing techniques is most like…
Which of the following phishing techniques is most likely to occur as a result of DNS poisoning? (Select the
best answer.)
Which of the following IP addresses must be configured …
You are configuring dynamic PAT on a Cisco ASA 5500 using the CLI. The ASA is running software version
8.3.
Which of the following IP addresses must be configured within a network object or object group? (Select the
best answer.)
Which of the following can be detected by the Cisco ESA…
Which of the following can be detected by the Cisco ESA CASE? (Select 2 choices.)
Which of the following features prevent attacks that co…
Which of the following features prevent attacks that consume CPU and memory resources? (Select 2 choices.)
Which of the following is true?
Your company’s Cisco ISE device and all of its supplicants support EAPFASTv2. A user’s authentication fails.
However, the user’s device attempts to authenticate and succeeds.
Which of the following is true? (Select the best answer.)
Which of the following are inband management tools that…
Which of the following are inband management tools that do not use encryption? (Select 3 choices.)
You are using ASDM to verify a clientless SSL VPN confi…
You are using ASDM to verify a clientless SSL VPN confi…
You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA.
Please click exhibit to answer the following questions.
Exhibit:
Which of the following statements is true regarding the display of a banner message when users establish a
clientless SSL VPN session by using the extranet connection profile? (Select the best answer.)