Which two options are purposes of the packet-tracer command?
Which two options are purposes of the packet-tracer command? (Choose two.)
Which command captures http traffic from Host A to Server A?
Which statement about the minimum requirements to set up stateful failover between these two firewalls is true
Your company is replacing a high-availability pair of Cisco ASA 5550 firewalls with the newer Cisco
ASA 5555-X models. Due to budget constraints, one Cisco ASA 5550 will be replaced at a time.
Which statement about the minimum requirements to set up stateful failover between these two
firewalls is true?
which two modes is zone-based firewall high availability available?
In which two modes is zone-based firewall high availability available? (Choose two.)
which statement describes how you will ensure that return traffic will reach the correct context?
You are the administrator of a multicontext transparent-mode Cisco ASA that uses a shared interface
that belongs to more than one context. Because the same interface will be used within all three
contexts, which statement describes how you will ensure that return traffic will reach the correct
context?
Which two commands can protect against this problem?
A rogue device has connected to the network and has become the STP root bridge, which has caused
a network availability issue.
Which two commands can protect against this problem? (Choose two.)
which two interface configuration commands help prevent VLAN hopping attacks?
According to Cisco best practices, which two interface configuration commands help prevent VLAN
hopping attacks? (Choose two.)
which two types of Layer 2 attacks?
When it is configured in accordance to Cisco best practices, the switchport port-security maximum
command can mitigate which two types of Layer 2 attacks? (Choose two.)
which two types of Layer 2 attacks?
When configured in accordance to Cisco best practices, the ip verify source command can mitigate
which two types of Layer 2 attacks? (Choose two.)