Which statement best describes inside policy based NAT?
Which statement best describes inside policy based NAT?
How should you act on your decision?
You are running Cisco lOS IPS software on your edge router. A new threat has become an issue.
The Cisco lOS IPS software has a signature that can address the new threat, but you previously retired the signature. You decide to unretire that signature to regain the desired protection level.
How should you act on your decision?
what will be the resulting action if you do not specify any zone pairs for a possible pair of zones?
When configuring a zone-based policy firewall, what will be the resulting action if you do not specify any zone pairs for a possible pair of zones?
Which two of these are benefits of implementing a zone-based policy firewall in transparent mode?
Which two of these are benefits of implementing a zone-based policy firewall in transparent mode? (Choose two.)
What happens when a client capable of using 802.1X joins the network on the same port?
You have configured a guest VLAN using 802.1X on a Cisco Catalyst switch. A client incapable of using 802.1X has accessed the port and has been assigned to the guest VLAN. What happens when a client capable of using 802.1Xjoins the network on the same port?
Which four networking tools does Cisco IME include that can be invoked for specific events…?
Which four networking tools does Cisco IME include that can be invoked for specific events, to learn more about attackers and victims using basic network reconnaissance? (Choose four.)
which password recovery is disabled?
What will happen if you try to recover the password on the Cisco IPS 4200 Series appliance on which password recovery is disabled?
Which Cisco IPS appliance feature is best used to detect these two conditions?
Which Cisco IPS appliance feature is best used to detect these two conditions?
1) The network starts becoming congested by worm traffic.
2) A single worm-infected source enters the network and starts scanning for other vulnerable hosts.
Which two parameters should you set to protect your DMZ servers in the most-time-efficient manner?
You want your inline Cisco IPS appliance to drop packets that pose the most severe risk to your network, especially to the servers on your DMZ. Which two parameters should you set to protect your DMZ servers in the most-time-efficient manner? (Choose two.)
Which three actions does the Cisco IDM custom signature wizard provide?
Which three actions does the Cisco IDM custom signature wizard provide? (Choose three.)