which a Cisco IPS appliance can compare network traffic…
Which of the following is a set of rules to which a Cisco IPS appliance can compare network traffic to determine
whether an attack is occurring? (Select the best answer.)
Which of the following web application threats is not t…
Which of the following web application threats is not typically mitigated by installing a WAF? (Select the best
answer.)
Which of the following is true of AnyConnect clients th…
You are configuring VPN access for Cisco AnyConnect clients. You finish the configuration by establishing a fail
open policy.
Which of the following is true of AnyConnect clients that fail to establish a VPN session? (Select the best
answer.)
Which of the following is true about how the Cisco rout…
You issue the following commands on a Cisco router:
tacacsserver host ts1 timeout 30 tacacsserver timeout 20
Which of the following is true about how the Cisco router communicates with the TACACS+ server? (Select the
best answer.)
Which of the following best describes the reason the ce…
In the Cisco ISE GUI, you click Administration > Certificates > Certificate Store and notice that a SCEP NDES
server RA certificate is installed on the ISE node.
Which of the following best describes the reason the certificate is there? (Select the best answer.)
Which of the following is not true of SIM systems?
Which of the following is not true of SIM systems? (Select the best answer.)
Which of the following is the best reason to enforce bl…
Which of the following is the best reason to enforce blacklisting by security zone on a Cisco device that uses
the Security Intelligence IP Address Reputation feature? (Select the best answer.)
which of the following RADIUS authentication protocols …
On a Cisco ASA, which of the following RADIUS authentication protocols are not supported? (Select 2 choices.)
Which of the following is the man-in-the-middle attack …
Which of the following is the man-in-the-middle attack that is most likely to be used to cause a workstation to
send traffic to a false gateway IP address? (Select the best answer.)
which of the following layers of the hierarchical netwo…
On which of the following layers of the hierarchical network design model should you implement PortFast,
BPDU guard, and root guard? (Select the best answer.)