What features can protect the data plane?
What features can protect the data plane? (Choose three.)
which two situations should you use out-of-band management?
In which two situations should you use out-of-band management? (Choose two)
Which EAP method uses protected Access Credentials?
Which EAP method uses protected Access Credentials?
What action can you take to allow the user access to th…
You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing
Security Intelligence IP address Reputation. A user calls and is not able to access a certain IP
address. What action can you take to allow the user access to the IP address?
how does the ASA handle the packet?
If a packet matches more than one class map in an individual feature type’s policy map, how
does the ASA handle the packet?
What type of algorithm uses the same key to encryp and …
What type of algorithm uses the same key to encryp and decrypt data?
Which SOURCEFIRE logging action should you choose to re…
Which SOURCEFIRE logging action should you choose to record the most detail about a
connection.
how will the switch respond?
which three protocols should the default ACL allow an a…
According to Cisco best practices, which three protocols should the default ACL allow an
access port to enable wired BYOD devices to supply valid credentials and connect to the
network? (Choose three)
Which three ESP fields can be encrypted during transmission?
Which three ESP fields can be encrypted during transmission? (Choose three)