Loading questions...
Updated
What is the Cisco preferred countermeasure to mitigate CAM overflows?
Which three statements about host-based IPS are true? (Choose three.)
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
Refer to the exhibit.
How can FirePOWER block malicious email attachments?
Which type of secure connectivity does an extranet provide?
In which three cases does the ASA firewall permit inbound HTTP GET requests during normal operations? (Choose three).
If a switch port goes directly into a blocked state only when a superior BPDU is received, what mechanism must be in use?
Which two characteristics apply to an Intrusion Prevention System (IPS)? (Choose two.)
Which quantifiable item should you consider when your organization adopts new technologies?
Refer to the exhibit.
In which two situations should you use out-of-band management? (Choose two.)
Referencing the CIA model, in which scenario is a hash-only function most appropriate?
Which command do you enter to enable authentication for OSPF on an interface?
Which two functions can SIEM provide? (Choose two.)
Refer to the exhibit.
Refer to the exhibit.
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)
What command can you use to verify the binding table status?
If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use?
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
Which three ESP fields can be encrypted during transmission? (Choose three.)
Which two services define cloud networks? (Choose two.)
Which two statements about stateless firewalls are true? (Choose two.)
What is the effect of the given command?
A network security administrator checks the ASA firewall NAT policy table with the show nat command. Which statement is false?
Which statement about the device time is true?
If a supplicant supplies incorrect credentials for all authentication methods configured on the switch, how will the switch respond?