which command in a policy-map?
During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP
fails by using which command in a policy-map?
Which command accomplishes this task?
After port security is deployed throughout an enterprise campus, the network team has been
overwhelmed with port reset requests. They decide to configure the network to automate the
process of re-enabling user ports. Which command accomplishes this task?
which command creates a domain for the context?
When configuring a new context on a Cisco ASA device, which command creates a domain for the
context?
Which two commands help trace this PC when the MAC address is known?
The network monitoring application alerts a network engineer of a client PC that is acting as a
rogue DHCP server. Which two commands help trace this PC when the MAC address is known?
(Choose two.)
which three of the following?
Cisco AVC allows control of which three of the following? (Choose three.)
Which option decreases consumption of bandwidth used by broadcast traffic?
While troubleshooting a network outage, a network engineer discovered an unusually high level of
broadcast traffic coming from one of the switch interfaces. Which option decreases consumption of
bandwidth used by broadcast traffic?
Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 tran
Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA
version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?
Which command globally enables AAA on a device?
Which command globally enables AAA on a device?
Which are the two most likely reasons that the category is still being blocked for a faculty and staff user?
The Web Security Appliance has identities defined for faculty and staff, students, and default
access. The faculty and staff identity identifies users based on the source network and
authenticated credentials. The identity for students identifies users based on the source network
along with successful authentication credentials. The global identity is for guest users not
authenticated against the domain.
Recently, a change was made to the organization’s security policy to allow faculty and staff access
to a social network website, and the security group changed the access policy for faculty and staff
to allow the social networking category.
Which are the two most likely reasons that the category is still being blocked for a faculty and staff
user? (Choose two.)
Which Cisco switch technology prevents traffic on a LAN from being disrupted by a broadcast, multicast, or uni
Which Cisco switch technology prevents traffic on a LAN from being disrupted by a broadcast,
multicast, or unicast flood on a port?