which of the following should you perform on the ACL to…
You have configured a BYOD implementation at a branch location, including an extended ACL named
DEFAULTACL on the Layer 2 ports of each access switch. BYOD clients are able to obtain IP addresses, but
connectivity to other network services seems to be sporadic or nonexistent, depending on the service.
You issue the show ip accesslist command on the switch and receive the following partial output:
Extended IP access list DEFAULTACL
10 permit icmp any any
20 permit udp any eq bootpc any eq bootpc
30 permit udp any any eq tftp
40 deny ip any any log
According to Cisco BYOD best practices, which of the following should you perform on the ACL to fix the
problem? (Select the best answer.)
Your supervisor asks you to configure a failover key on…
Your company’s active ASA currently shares its stateful failover link with a regular data interface. Your
supervisor asks you to configure a failover key on both the active ASA and the standby ASA.
Which of the following is most likely the reason? (Select the best answer.)
Which of the following IP addresses can you configure i…
You are configuring dynamic PAT on a Cisco ASA 5500 using the CLI. The ASA is running software version
8.3.
Which of the following IP addresses can you configure inline? (Select the best answer.)
Which of the following is an outputspreading technique …
Which of the following is an outputspreading technique that spammers use to manipulate reputation scores and
defeat filters? (Select the best answer.)
Which of the following features protects the control pl…
Which of the following features protects the control plane by classifying traffic into three separate control plane
subinterfaces? (Select the best answer.)
Which of the following enables the validation of both u…
Which of the following enables the validation of both user and device credentials in a single EAP transaction?
(Select the best answer.)
Which of the following is typically used to manage a Ci…
Which of the following is typically used to manage a Cisco router in-band? (Select the best answer.)
You are using ASDM to verify a clientless SSL VPN confi…
You are using ASDM to verify a clientless SSL VPN confi…
You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA.
Please click exhibit to answer the following questions.
Exhibit:
Which of the following statements is true regarding VPN connections made by a user who is using the john
user account? (Select the best answer.)
Which of the following statements are true regarding cl…
You are using ASDM to verify a clientless SSL VPN configuration made by a junior administrator on an ASA.Please click exhibit to answer the following questions.
Exhibit:
Which of the following statements are true regarding clientless SSL VPN connections that are made by using
the boson tunnel group? (Select 3 choices.)