Which of the following are true of ARP traffic on a Cis…
Which of the following are true of ARP traffic on a Cisco zonebased firewall in transparent mode? (Select 2
choices.)
which of the following authentication protocols is not …
On a Cisco ASA, which of the following authentication protocols is not supported by the TACACS+ server?
(Select the best answer.)
Which of the following is a VLAN hopping attack that us…
Which of the following is a VLAN hopping attack that uses DTP to negotiate a trunk link? (Select the best
answer.)
which layer of the campus network hierarchy are ACLs an…
In which layer of the campus network hierarchy are ACLs and interVLAN routing typically implemented? (Select
the best answer.)
Which of the following private VLAN port types can comm…
Which of the following private VLAN port types can communicate with promiscuous private VLAN ports but not
with isolated private VLAN ports? (Select 2 choices.)
Which of the following lost or stolen device options ar…
Which of the following lost or stolen device options are not available to employees when MDM is integrated with
ISE? (Select 2 choices.)
Which of the following EAP methods requires digital cer…
Which of the following EAP methods requires digital certificates to be installed on the server but not on the
client? (Select the best answer.)
what the IPS has identified?
The IPS on your company’s network is blocking normal web traffic.
Which of the following best describes what the IPS has identified? (Select the best answer.)
Which of the following forms of malware are typically s…
Which of the following forms of malware are typically standalone software that appear to be legitimate
applications? (Select the best answer.)
Which of the following would you most likely configure …
Which of the following would you most likely configure on a host to alert you about possible attacks without
filtering traffic? (Select the best answer.)