Which of the following commands will configure a static…
Which of the following commands will configure a static pointtopoint VTI tunnel to use 128bit encryption?
(Select the best answer.)
Which of the following SNMP versions was the first vers…
Which of the following SNMP versions was the first version to offer both authentication and encryption? (Select
the best answer.)
Which of the following could be best described as an ad…
Which of the following could be best described as an advanced persistent attack? (Select the best answer.)
Which of the following is most likely to indicate that …
Which of the following is most likely to indicate that the configured main mode ISAKMP policy does not match
the policy proposed by the remote peer? (Select the best answer.)
Which of the following is true?
You issue the show ntp associations detail command on Router2 and receive the following output:
Router2#show ntp associations detail
10.0.12.1 configured, authenticated, our_master, sane, valid, stratum 3
ref ID 127.127.1.1, time BF6C06E0.55040FD5 (09:02:04.717 UTC Thu Jul 25 2013) <output omitted>
Which of the following is true? (Select the best answer.)
which of the following cryptographic protocols?
EAPFASTv2 implemented a requirement to support which of the following cryptographic protocols? (Select the
best answer.)
Which of the following is most likely the problem?
The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You
issue the following commands on Router1:
interface serial 0/0 ip ospf
authenticationkey b0s0n router
ospf 1 routerid 1.1.1.1
network 10.10.10.0 0.0.0.255 area 1
network 192.168.51.48 0.0.0.3 area 1
area 0 authentication
You issue the following commands on Router2:
interface serial 0/0 ip ospf
authenticationkey b0s0n router
ospf 2routerid 2.2.2.2 network
10.10.20.0 0.0.0.255 area 2
network 192.168.51.48 0.0.0.3
area 0 area 0 authentication
Router1 and Router2 do not form an OSPF adjacency.
Which of the following is most likely the problem? (Select the best answer.)
Which of the following is a type of phishing attack tha…
Which of the following is a type of phishing attack that specifically targets highranking corporate executives?
(Select the best answer.)
Which of the following is the ASA most likely to match?
A Cisco ASA queries an LDAP server for a VPN user OU attribute of bsnsw and receives multiple results.
Which of the following is the ASA most likely to match? (Select the best answer.)
Which of the following are Cisco IOS privilege levels t…
Which of the following are Cisco IOS privilege levels that are not typically assigned by default? (Select 3
choices.)