which two interface configuration commands help prevent VLAN hopping attacks?
According to Cisco best practices, which two interface configuration commands help prevent
VLAN hopping attacks? (Choose two.)
which two types of Layer 2 attacks?
When it is configured in accordance to Cisco best practices, the switchport port-security maximum
command can mitigate which two types of Layer 2 attacks? (Choose two.)
which two types of Layer 2 attacks?
When configured in accordance to Cisco best practices, the ip verify source command can
mitigate which two types of Layer 2 attacks? (Choose two.)
which type of PVLAN port should be used for each host?
Which security operations management best practice should be followed to enable appropriate network access for
Which security operations management best practice should be followed to enable appropriate
network access for administrators?
Which two features block traffic that is sourced from non-topological IPv6 addresses?
Which two features block traffic that is sourced from non-topological IPv6 addresses? (Choose
two.)
Which three options correctly identify the Cisco ASA1000V Cloud Firewall?
Which three options correctly identify the Cisco ASA1000V Cloud Firewall? (Choose three.)
Which two SNMPv3 features ensure that SNMP packets have been sent securely?
Which two SNMPv3 features ensure that SNMP packets have been sent securely? (Choose two.)
Which two statements about zone-based firewalls are true?
Which two statements about zone-based firewalls are true? (Choose two.)
Which command will prevent access to the startup-config in NVRAM?
An attacker has gained physical access to a password protected router. Which command will
prevent access to the startup-config in NVRAM?