You enable SNMPv3 on a cisco router using the following commands: Access-list 90 permit 10.10.10.0 0.0.0.255 Access-list 90 deny any log Snmp-server user admin TEST v3 auth sha secret989! Priv aes 256 Pass8718! Access 90 Which security level is being used?
What should you implement on a switch to mitigate VLAN hopping attacks?
Router R1 has been configured using a firewall.Which zones are shown in the exhibit?
You are connected to an ASA firewall using cisco anyconnect.youcheck the route details as shown in the exhibit . Which anyconnect option has been enabled to exclude the default route?
Which access method of Packet capture offers a hardware tool with no risk of dropped packets?
Which two features have been enabled on the ASA?(Choosetwo)
You have a private VLAN configured as shown in the exhibit. Which statement accurately describes the behavior of the private VLAN?
The broadcast traffic from port 1 will reach port 2.
Which command enables the IOS resilience feature on a router?
You are debugging an issue with an IPsec VPN tunnel. You find the following error: %CRPT0-4-1KMP_BAD_MESSAGE: IKE message from 184.108.40.206 failed its sanity check or is malformed. What should you verify on both routers to fix the problem?
Which IPS action terminates the current packet and all the futures packets from an attacker address?
Which method uses a dedicated physical interface and a separate communication channel to manage a network device?
You are configuring a VPN policy. Your manager has asked you to use the next-generation cryptographic algorithms. Which two Dithe-Hellman groups shown in the exhibit should you choose? (Choose two.)
You configure a native VLAN on a Cisco switch. Why should you change the default native VLAN ID?
Which statement accurately describes the Web Interaction Tracking feature in a Cisco Email Security Appliance (ESA)?
Which statement accurately describes an application firewall?
Which statement accurately describes a situation in which you should implement dynamic NAT on a Cisco ASA Series 9.x firewall to secure the company internet edge?
A user downloads an application from the Internet that has been described as antivirus software. However. the application steals sensitive data and provides unauthorized backdoor access to the system. What kind of malware is this?
Which Cisco appliance provides web reputation capabilities, leak prevention, and cloud-based zero-day threat detection services with malware protection?
You have the environment shown in the exhibit. You configure interface naming. IP addressing. routing, Port Address Translation (PAT), and the security level on a Cisco ASA 5512-X. Which two firewall attributes allow an internal user to access the internet by default? (Choose two.)
What do you call someone who bug-tests a system to find vulnerabilities before a software launch?
Refer to the exhibit. Which set of commands should you use to allow ASDM access from PC1 on port 4443?
You are troubleshooting a local TACACS+ authentication issue using the debug aaa authentication command. What is the expected AAA session status if authentication is successful?
Which three virtual-form-factor devices are available from Cisco? (Choose three.)
You are troubleshooting a site-to-site VPN (shown in the exhibit). What does the output show?
What can you achieve by S/MIME?
Which solution can help you protect a network against zero-day security threats?
Which cloud computing solution offers a platform for creating software and application development, and testing?
Which solution should you use to script and maintain a host name and a port number for a web proxy server?
Which statement accurately describes a proxy firewall?
Courses Offered In This Certification