Which two actions you can take to enable the two hosts to communicate with each other?
The host A Layer 2 port is configured in VLAN 5 on switch 1, and the host B Layer 2 port is configured
in VLAN 10 on switch 1. Which two actions you can take to enable the two hosts to communicate
with each other? (Choose two.)
Which two pieces of information should you acquire before you troubleshoot an STP loop?
Which two pieces of information should you acquire before you troubleshoot an STP loop? (Choose
two.)
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single
statement?
which three actions can be applied to a traffic class?
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a
traffic class? (Choose three.)
which three types of traffic are permitted by the router when some of the router interfaces are assigned to a
With Cisco IOS zone-based policy firewall, by default, which three types of traffic are permitted by
the router when some of the router interfaces are assigned to a zone? (Choose three.)
Which two options are advantages of an application layer firewall?
Which two options are advantages of an application layer firewall? (Choose two.)
what would be the resulting dynamically configured ACL for the return traffic on the outside ACL?
Which option is the resulting action in a zone-based policy firewall configuration with these conditions?
which five types of traffic are permitted?
A Cisco ASA appliance has three interfaces configured. The first interface is the inside interface with
a security level of 100. The second interface is the DMZ interface with a security level of 50. The
third interface is the outside interface with a security level of 0.
By default, without any access list configured, which five types of traffic are permitted? (Choose
five.)
Which type of firewall technology is considered the versatile and commonly used firewall technology?
Which type of firewall technology is considered the versatile and commonly used firewall
technology?