Which of the following IPS detection methods is a strin…
Which of the following IPS detection methods is a string pattern-based detection method? (Select the best
answer.)
Which of the following can be determined from the Route…
Which of the following statements is true regarding LDA…
Which of the following statements is true regarding LDAP attribute maps on an ASA? (Select the best answer.)
Which of the following is an IOS privilege level that p…
Which of the following is an IOS privilege level that provides the highest level of access on a Cisco router?
(Select the best answer.)
The outside server has responded with a SYN/ACK segment…
An inside host has initiated a TCP connection through a Cisco ASA to an outside server. The outside server
has responded with a SYN/ACK segment? however, the inside host has not yet responded with an ACK
segment.
Which of the following lines of output from the show conn command best represents the state of the connection
in this scenario? (Select the best answer.)
Which of the following traffic types are blocked by def…
Which of the following traffic types are blocked by default in a zone-based policy firewall configuration? (Select
2 choices.)
Which of the following is typically implemented in a cl…
Which of the following is typically implemented in a cluster configuration? (Select the best answer.)
Which of the following devices requires that a physical…
Which of the following devices requires that a physical interface be in promiscuous mode in order to monitor
network traffic? (Select the best answer.)
which it entered the ASA?
Which of the following commands should you issue to allow a packet to exit an ASA through the same interface
through which it entered the ASA? (Select the best answer.)
Which of the following traffic types can be detected by…
Which of the following traffic types can be detected by the FirePOWER ratebased prevention preprocessor
engine? (Select the best answer.)