Which of the following are features of connection table logging? (Choose three)
What statements describe characteristics of the management plane and its security controls? (Choose three)
Which of the following are characteristics of the access rules table in the ASDM interface? (Choose three)
Before tuning OSI layer 3-4 stateful tuning on the headquarters Cisco ASA, you want to understand problematic properties of the local network environment and the tuning options within the default inspection policy. What statements about the default inspection policy on a Cisco ASA are correct? (Choose two)
Identify statements that describe layer 2 data plane and layer 3 data plane security measures. (Choose two)
Select the statements that describe characteristics of control plane policing? (Choose two)
How should you configure Zone-Based Policy Firewall zones and zone pairs? (Choose two)
You are configuring IP source address control using static addressing. Currently only IP Source Guard with IP address filtering is enabled. What command enables IP source guard with both IP and MAC address filtering on all DHCP-snooping-enabled ports?
You have been assigned the task of defending the network against Layer 2 attacks. What can you do as a best practice? (Choose two)
Identify the statements that describe NAT with PAT and policy-based NAT. (Choose three)
When configuring management plane access control, which implementation type may cause compatibility issues with some Cisco hardware platforms?
Which commands can be used to verify the identity-based firewall? (Choose two)
Syslog has been enabled. However, Botnet Traffic Filter is not logging messages. What could be causing this issue?
Which of the following two are the default behaviors when tagging interfaces into the Cisco IOS Zone-Based Policy Firewall zones? (Choose two)
You have created a packet capture named "drop" to capture all packets dropped by interface access rules. What command will only display the captured packets from the drop capture?
You are looking at how the Cisco ASA supports application layer inspection for many other application layer protocols. From the following, which can you configure inspection functionality for? (Choose four)
You need to prevent LAN traffic from being disrupted by broadcast storms on a Catalyst 3550 switch interface. You have been notified to configure the switch to drop broadcast traffic when exceeding 70 percent of total available bandwidth. Traffic should resume automatically when approximately half the total of available bandwidth is detected. What needs to be entered in the CLI?
Which of the following options are the benefits of the Identity Internal Firewall? (Choose three)
What are the benefits of using management plane access control features? (Choose three)
A network has recently configured the following L2 Data Plane control: DHCP snooping. What will configuring this accomplish for the organization? (Choose two)
What statements describe secure management protocols? (Choose three)
What are the benefits of Cisco ASA object groups? (Choose three)
A network administrator has configured NTP with authentication on the company's Cisco IOS routers. Which command can be used to verify that NTP has been authenticated with the NTP server?
DHCP does not include authentication and is therefore vulnerable to spoofing and other attacks. In which ways can you deploy DHCP control to help mitigate such attacks? (Choose four)
Cisco SecureX is an access control strategy that allows for more effective, higher-level policy creation and enforcement for mobile users. Identify the statements that describe components of the of the SecureX architecture. (Choose two)
You are in the process of configuring PVLANs on a Cisco Catalyst switch. You need to configure the port that connects to the default gateway. What type of port should be configured?
How can you verify your object groups on the Cisco ASA? (Choose two)
Examine the output in the exhibit. What can be concluded based upon the output?
Which of the following commands can be used to verify the functionality of your Botnet Traffic Filter? (Choose three)
Which options are recommended baseline forms of telemetry that should be used on network infrastructure devices? (Choose three)
Class maps for OSI layers 3 and 4 identify traffic based on criteria such as protocols, ports, IP addresses, and other attributes for these layers. Identify statements that correctly describe matching criteria. (Choose two)
When configuring policy-based NAT, which type of access control list should be configured to match both the source and destination IP addresses?
Which of the following can be used for URL filtering with Cisco IOS Zone-Based Policy Firewall? (Choose three)
You need to implement dynamic ARP inspection on a Cisco Catalyst 6500 series switch. The switch hosts either computer systems that have been dynamically or statically assigned IP addresses. What is the first step that you should undertake?
Which of the following correctly describes inline mode when all traffic is being inspected by AIP-SSM?
A network group named blcokNY was created. It contains only IPv4 networks. An IPv6 network needs to have the same ACLs applied to it. Which option would best achieve this requirement?
Examine the output in the exhibit. You are troubleshooting the syslog message displayed in the output. Which severity level is outlined within the syslog message?
You are viewing the following syslog message: Jul 23 2012 00:12:01 ASAFW : %ASA-7-111009: User "administrator" executed cmd: show interface What does the message severity level indicate?
Which command can you use to verify your global access rule configuration?
Which command can be used to verify that secure management access protocols are configured on a Cisco IOS device?
Suppose you are viewing the partial router output displayed below. Identify the statements that best describe this configuration of Cisco IOS Secure Management Access? crypto key generate rsa modulus 2048 !ip ssh version 2 username admin privilege 15 secret Admin92DXBh !ip access-list standard 90 permit 10.10.10.0 0.0.0.255 deny any log !no ip http server ip http secure-server ip http authentication local ip http access-class 90 !snmp-server community 7rNjOgmEnUMRpR0remI ro 90 (Choose three)
A user has been added to a SNMPv3 management group. Which command can you use to identify the SNMPv3 group to which the user belongs?
A Cisco security consultant is designing a firewall solution for a company. The company contains a single Active Directory Domain Services domain and has several remote employees. Management has given the following requirements: - Only HR employees can access the HR department network. - Users should not be prompted for login information. Which firewall solution can be used?
Which command set would be used to create an object group for a server running the DNS server service located on the 10.0.0.0 255.0.0.0 network?
Which command would be issued to set the GigabitEthernet0/0 as the dedicated management interface and allow only ssh? (Choose two)
Which of the following are features of Application layer gateways? (Choose three)
A network administrator is designing a firewall solution for his company. The solution includes the configuration of all Cisco routers. The solution must meet the following requirements: - Use a restrictive approach - Be configured using a static rulebase - Work best with Layer 3 only filtering - Be transparent and provide high performance Which firewall filtering technology should be used?
The Cisco ASA 5500-X Series Next-Generation Firewalls provide four main remote access protocols to access the adaptive security appliance management functions. Which remote access protocol uses X.509 certificates for authentication?
Identify the statements that describe characteristics of management access AAA. (Choose four)
Which statements describe the benefits of inside NAT? (Choose three)
Identify the features of the Zone-Based Policy Firewall. (Choose three)
You are going to implement Cisco MPF to provide granularity and flexibility when implementing network policies for traffic flows. Identify the statements that best describe how MPF works with OSI layer 3-4 traffic. (Choose two)
How can you control management access to the ASA using management access AAA? (Choose three)
You plan on implementing TrustSec in the network infrastructure. What statement best describes its use?
In what ways can ACLs protect the data plane? (Choose five)