Which of the following MPF elements can be used to configure Application layer protocol inspection? (Select th
Which of the following MPF elements can be used to configure Application layer protocol inspection? (Select the best answer.) A. a class map B. a policy map C. a service policy D. a global policy E. an extended access list F. a standard access list Explanation: A policy map can be used to configure Application […]
Which of the following is true? (Select the best answer.)
You enable logging at the end of the session in Cisco FireSIGHT Management Center. Which of the following is true? (Select the best answer.) A. The log will contain less information than at the beginning of the session. B. You will not be able to log connections handled by an SSL policy. C. Information will […]
You have configured a BYOD implementation at a branch location, including an extended ACL named DEFAULTACL on
You have configured a BYOD implementation at a branch location, including an extended ACL named DEFAULTACL on the Layer 2 ports of each access switch. BYOD clients are able to obtain IP addresses, but connectivity to other network services seems to be sporadic or nonexistent, depending on the service. You issue the show ip accesslist […]
Which of the following is most likely the reason? (Select the best answer.)
Your company’s active ASA currently shares its stateful failover link with a regular data interface. Your supervisor asks you to configure a failover key on both the active ASA and the standby ASA. Which of the following is most likely the reason? (Select the best answer.) A. so that the risk of exposure of VPN […]
Which of the following IP addresses can you configure inline? (Select the best answer.)
You are configuring dynamic PAT on a Cisco ASA 5500 using the CLI. The ASA is running software version 8.3. Which of the following IP addresses can you configure inline? (Select the best answer.) A. inside global B. outside global C. inside local D. outside local Explanation: You can configure an inside global address inline […]
Which of the following is an output spreading technique that spammers use to manipulate reputation scores and
Which of the following is an output spreading technique that spammers use to manipulate reputation scores and defeat filters? (Select the best answer.) A. phishing B. snowshoe spam C. waterfalling D. listwashing Explanation: Of the available choices, snowshoe spam is an output spreading technique that spammers use to manipulate reputation scores and defeat filters. Snowshoe […]
Which of the following features protects the control plane by classifying traffic into three separate control
Which of the following features protects the control plane by classifying traffic into three separate control plane subinterfaces? (Select the best answer.) A. CoPP B. CPPr C. RBAC D. uRPF Explanation: Control Plane Protection (CPPr) protects the control plane by classifying control plane traffic into three separate subinterfaces: the host subinterface, the transit subinterface, and […]
Which of the following enables the validation of both user and device credentials in a single EAP transaction?
Which of the following enables the validation of both user and device credentials in a single EAP transaction? (Select the best answer.) A. PEAP B. EAP-FAST C. EAP-FAST with EAP chaining D. EAP-MD5 Explanation: Extensible Authentication Protocol (EAP)Flexible Authentication via Secure Tunneling (FAST) with EAP chaining, which is also sometimes called EAPFAST version 2 (EAPFASTv2), […]
Which of the following is typically used to manage a Cisco router in-band? (Select the best answer.)
Which of the following is typically used to manage a Cisco router in-band? (Select the best answer.) A. a VTY port B. a serial port C. a console port D. an auxiliary port Explanation: A virtual terminal (VTY) port is typically used to manage a Cisco router in-band. When a Cisco device is operating in […]
Which of the following connection profiles will use the boson_grp group policy? (Select the best answer.)
Which of the following connection profiles will use the boson_grp group policy? (Select the best answer.) A. only the boson connection profile B. only the DefaultRAGroup connection profile C. only the DefaultWEBVPNGroup connection profile D. both the boson connection profile and the DefaultWEBVPNGroup connection profile E. both the DefaultRAGroup connection profile and the DefaultWEBVPNGroup Explanation: […]