which two types of Layer 2 attacks?
When configured in accordance to Cisco best practices, the ip verify source command can mitigate
which two types of Layer 2 attacks? (Choose two.)
which two types of Layer 2 attacks?
When it is configured in accordance to Cisco best practices, the switchport port-security maximum
command can mitigate which two types of Layer 2 attacks? (Choose two.)
which two interface configuration commands help prevent…
According to Cisco best practices, which two interface configuration commands help prevent VLAN
hopping attacks? (Choose two.)
Which two commands can protect against this problem?
A rogue device has connected to the network and has become the STP root bridge, which has
caused a network availability issue.
Which two commands can protect against this problem? (Choose two.)
which statement describes how you will ensure that retu…
You are the administrator of a multicontext transparent-mode Cisco ASA that uses a shared
interface that belongs to more than one context. Because the same interface will be used within all
three contexts, which statement describes how you will ensure that return traffic will reach the
correct context?
which two modes is zone-based firewall high availabilit…
In which two modes is zone-based firewall high availability available? (Choose two.)
Which statement about the minimum requirements to set u…
Your company is replacing a high-availability pair of Cisco ASA 5550 firewalls with the newer Cisco
ASA 5555-X models. Due to budget constraints, one Cisco ASA 5550 will be replaced at a time.
Which statement about the minimum requirements to set up stateful failover between these two
firewalls is true?
Which command captures http traffic from Host A to Server A?
Which two options are purposes of the packet-tracer command?
Which two options are purposes of the packet-tracer command? (Choose two.)
Which three options are default settings for NTP parame…
Which three options are default settings for NTP parameters on a Cisco ASA? (Choose three.)