Which of the following occurs when an IDS or IPS does n…
Which of the following occurs when an IDS or IPS does not identify malicious traffic that enters the network?
(Select the best answer.)
Which of the following is least likely to be considered…
Which of the following is least likely to be considered a form of malware? (Select the best answer.)
which the NAT rules will be processed?
You are configuring manual NAT on a Cisco Firepower device.
Which of the following best describes the order in which the NAT rules will be processed? (Select the best
answer.)
Which of the following is a reason to use the roundrobi…
Which of the following is a reason to use the roundrobin assignment feature of dynamic PAT addresses?
(Select the best answer.)
Which of the following could you do?
Your company has installed and configured a Sourcefire device. You want to reduce false positives from a
trusted source.
Which of the following could you do? (Select 2 choices.)
Which of the following commands should you issue when t…
Which of the following commands should you issue when troubleshooting basic IKE peering to determine
whether PSKs are present and matching on both peers? (Select the best answer.)
Which of the following are you most likely to recommend…
You manage your company’s Cisco devices by using Telnet. Your supervisor is concerned about
eavesdropping over inband device management and has asked you to recommend a solution that would allow
you to disable the Telnet servers on each device.
Which of the following are you most likely to recommend as a replacement? (Select the best answer.)
You are using ASDM to verify an IPSec VPN configuration…
Which of the following will occur when a user attempts …
You are using ASDM to verify an IPSec VPN configuration made by another administrator on an ASA. Please
click exhibit to answer the following questions.
Exhibit:
Which of the following will occur when a user attempts to establish a VPN connection to the ASA by using the
boson connection profile and the boson user account? (Select the best answer.)
You are using ASDM to verify an IPSec VPN configuration…
You are using ASDM to verify an IPSec VPN configuration made by another administrator on an ASA.
Please click exhibit to answer the following questions.
Exhibit:
Which of the following group policies will be based when a user establishes a VPN connection by using the
boson connection profile? (Select the best answer.)