Which four are IPv6 First Hop Security technologies?
Which four are IPv6 First Hop Security technologies? (Choose four.)
What is a security concern of using SLAAC for IPv6 address assignment?
IPv6 addresses in an organization’s network are assigned using Stateless Address Autoconfiguration.
What is a security concern of using SLAAC for IPv6 address assignment?
Which two device types can Cisco Prime Security Manager manage in Multiple Device mode?
Which two device types can Cisco Prime Security Manager manage in Multiple Device mode?
(Choose two.)
Which technology provides forwarding-plane abstraction to support Layer 2 to Layer 7 network services in Cisco
Which technology provides forwarding-plane abstraction to support Layer 2 to Layer 7 network
services in Cisco Nexus 1000V?
which interface on a Cisco ASA 1000V firewall should a security profile be applied when a VM sits behind it?
To which interface on a Cisco ASA 1000V firewall should a security profile be applied when a VM sits
behind it?
Which feature must you configure to open data-channel pinholes for voice packets that are sourced from a TRP w
You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay Point
(TRP) in a voice network. Which feature must you configure to open data-channel pinholes for voice
packets that are sourced from a TRP within the WAN?
Which two voice protocols can the Cisco ASA inspect?
Which two voice protocols can the Cisco ASA inspect? (Choose two.)
Which two ICMPv6 packet types must you explicitly allow to enable traffic to traverse the interface?
You have explicitly added the line deny ipv6 any log to the end of an IPv6 ACL on a router interface.
Which two ICMPv6 packet types must you explicitly allow to enable traffic to traverse the interface?
(Choose two.)
what security mechanism can prevent an attacker from gaining network topology information from CDP?
Enabling what security mechanism can prevent an attacker from gaining network topology
information from CDP?
Which log level provides the most detail on the Cisco Web Security Appliance?
Which log level provides the most detail on the Cisco Web Security Appliance?