Which of the following threats has a dedicated FirePOWE…
Which of the following threats has a dedicated FirePOWER preprocessor engine? (Select the best answer.)
Which of the following commands are you most likely to …
You have been asked to enable the Cisco IOS Resilient Configuration feature on a Cisco router. You issue thefollowing commands on the router:
Router#configure terminal
Router(config)#secure boot-image
Which of the following commands are you most likely to issue next to complete the configuration? (Select the
best answer.)
Which of the following ISAKMP states indicates that the…
Which of the following ISAKMP states indicates that the IKE peers have negotiated security parameters and
exchanged keys using aggressive mode during phase 1 of the IKE process? (Select the best answer.)
Which of the following is most likely to protect the av…
Which of the following is most likely to protect the availability component of the CIA triad? (Select the best
answer.)
which of the following in common?
RADIUS and TACACS+ have which of the following in common? (Select the best answer.)
which of the following are you most likely to connect t…
To which of the following are you most likely to connect to manage a Cisco router in ROMmon mode? (Select 2
choices.)
Which of the following MPF elements can be used to conf…
Which of the following MPF elements can be used to configure Application layer protocol inspection? (Select
the best answer.)
Which of the following is true?
You enable logging at the end of the session in Cisco FireSIGHT Management Center.
Which of the following is true? (Select the best answer.)
which of the following should you perform on the ACL to…
You have configured a BYOD implementation at a branch location, including an extended ACL named
DEFAULTACL on the Layer 2 ports of each access switch. BYOD clients are able to obtain IP addresses, but
connectivity to other network services seems to be sporadic or nonexistent, depending on the service.
You issue the show ip accesslist command on the switch and receive the following partial output:
Extended IP access list DEFAULTACL
10 permit icmp any any
20 permit udp any eq bootpc any eq bootpc
30 permit udp any any eq tftp
40 deny ip any any log
According to Cisco BYOD best practices, which of the following should you perform on the ACL to fix the
problem? (Select the best answer.)
Your supervisor asks you to configure a failover key on…
Your company’s active ASA currently shares its stateful failover link with a regular data interface. Your
supervisor asks you to configure a failover key on both the active ASA and the standby ASA.
Which of the following is most likely the reason? (Select the best answer.)