What additional step must be taken if users receive a ‘…
A router is being enabled for SSH command line access.
The following steps have been taken:
– The vty ports have been configured with transport input SSH and login
local.
– Local user accounts have been created.
– The enable password has been configured.
What additional step must be taken if users receive a ‘connection refused’ error when attempting
to access the router via SSH?
Which statement describes how to set these access levels?
You are the administrator of a Cisco ASA 9.0 firewall and have been tasked with ensuring that the
Firewall Admins Active Directory group has full access to the ASA configuration. The Firewall
Operators Active Directory group should have a more limited level of access.
Which statement describes how to set these access levels?
Which statement describes how VLAN hopping can be avoided?
You are a security engineer at a large multinational retailer. Your Chief Information Officer recently
attended a security conference and has asked you to secure the network infrastructure from VLAN
hopping.
Which statement describes how VLAN hopping can be avoided?
Which Cisco switch technology prevents traffic on a LAN…
Which Cisco switch technology prevents traffic on a LAN from being disrupted by a broadcast,
multicast, or unicast flood on a port?
Which statement describes the correct steps to enable B…
Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA
version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?
which command creates a domain for the context?
When configuring a new context on a Cisco ASA device, which command creates a domain for the
context?
What is the default behavior of an access list on a Cis…
What is the default behavior of an access list on a Cisco ASA?
Which ASA feature is used to keep track of suspected at…
Which ASA feature is used to keep track of suspected attackers who create connections to too
many hosts or ports?
which command is used to nest objects in a pre-existing…
On an ASA running version 9.0, which command is used to nest objects in a pre-existing group?
what security mechanism can prevent an attacker from ga…
Enabling what security mechanism can prevent an attacker from gaining network topology
information from CDP via a man-in-the-middle attack?