2018 May New Cisco 200-601 Exam Dumps with PDF and VCE Just Updated Today! Following are some new 200-601 Real Exam Questions:

1.|2018 Latest 200-601 Exam Dumps (PDF & VCE) 90Q Download:
https://www.braindump2go.com/200-601.html

2.|2018 Latest 200-601 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/0B75b5xYLjSSNWTIxdF9WZmZqMms?usp=sharing

QUESTION 57
Refer to the exhibit. L3SW1 has a spanning-tree priority of 8192 set on VLANs 1, 300, and 301, and these VLANs are configured on and trunked between all switches.

Executing the command show spanning-tree blockedports on L2SW5 results in:
L2SW5# show spanning-tree blockedports
Name Blocked Interfaces List
——————– ————————————
VLAN0001 Gi1/1
VLAN0300 Gi1/1
VLAN0301 Gi1/1
An additional VLAN, VLAN302, is defined on all switches and trunked between them. VLAN302 access ports are set up on each of the switches and PLC#1, I/O#1, and the PanelView are attached. You expect the new VLAN to be listed as blocked on interface GigabitEthernet1/1 of L2SW5 but it is not. The three new devices are able to communicate with each other.
After executing the same command on all switches you see this output on L2SW4:
L2SW4# show spanning-tree blockedports
Name Blocked Interfaces List
——————– ————————————
VLAN0001 Gi1/2
VLAN0300 Gi1/2
VLAN0301 Gi1/2
Why is VLAN302 forwarding on L2SW5 interface GigabitEthernet 1/1 and L2SW4 interface GigabitEthernet 1/1 and 1/2?

A. VLAN302 is not configured in the VLAN database on L2SW5
B. VLAN302 is not in the allowed list on the L2SW5 interface GigabitEthernet1/1 trunk
C. L2SW4 is the spanning tree root for VLAN 302
D. The FO3 fiber-optic cable between L2SW4 and L2SW5 is damaged

Answer: C

QUESTION 58
Which two are possible solutions to control which devices can communicate between industrial zones? (Choose two)

A. Use per zone private IP addressing and deploy NAT to control traffic between zones
B. Put access control lists on switches connecting industrial zones to control traffic
C. Attach each zone to a firewall to control intra-zone traffic
D. Deploy QoS traffic shaping to limit the volume of traffic between industrial zones
E. Deploy an IDS system between the zones to control intra-zone traffic

Answer: BC

QUESTION 59
Refer to the exhibit. Which three options are needed to configure NAT on router GW so PC1 and PC2 will be able to ping 203.0.113.1? (Choose three)

A. interface Ethernet0
ip nat inside
interface Ethernet1
ip nat outside
B. ip access-list standard ACL_NAT
permit 10.1.1.0 0.0.0.255
C. ip nat inside source static tcp 10.1.1.0 80 interface Ethernet1 80
D. interface Ethernet0
ip nat outside
interface Ethernet1
ip nat inside
E. ip nat inside source list ACL_NAT interface Ethernet1 overload
F. ip access-list extended ACL_NAT
permit tcp 10.1.1.0 0.0.0.255 any eq 80

Answer: ABE

QUESTION 60
Which selection is a reason why IGMP snooping should be configured on a switched network?

A. IGMP snooping populates the snooping table with the results of DHCP requests and can be used by Dynamic ARP Inspection to block IP spoofing attacks at Layer-2.
B. IGMP snooping verifies the source IP address of every IPv4 packet to ensure that it hasn’t been originated from a port different than its return path.
C. IGMP snooping is used to filter ping requests and results to avoid overflowing the MAC address table of the switch.
D. IGMP snooping allows a Layer-2 switch to limit the transmission of multicast frames to only the ports that have members of the relevant IGMP group.

Answer: D

QUESTION 61
Refer to the exhibit. An expansion project added an E-Tap and Device Level Ring to interface FastEthernet1/1 of L2SW1. The administrator has looked at the logs of L2SW1 and found that FastEthernet1/1 was in an error-disabled state.Using command line access on L2SW1, the administrator issued the following commands in configuration mode:

L2SW1(config)# interface FastEthernet 1/1
L2SW1(config-if)# shutdown
L2SW1(config-if)# no shutdown
The administrator checked the logs of L2SW1 and found the following:
Mar 30 02:23:17.588: %PM-4-ERR_DISABLE: bpduguard error detected on Fa1/1, putting Fa1/1 in err-disable state
The administrator checked the software configuration of the switch port and found the following:
interface FastEthernet1/1
switchport access vlan 310
switchport mode access
speed 100
duplex full
no mdix auto
spanning-tree portfast
spanning-tree bpduguard enable
Why has the port gone error-disabled?

A. interface FastEthernet1/1 is configured as an access port on the wrong VLAN.
B. There is a duplex mismatch between interface FastEthernet1/1 and the E-Tap.
C. The E-Tap is not configured as a ring supervisor causing a loop on interface FastEthernet1/1.
D. The E-Tap is configured at 10Mbps and the switch port is configured at 100Mbps.
E. Automatic MDI Crossover detection is disabled.

Answer: C

QUESTION 62
Which in-depth approach is used when deploying defense in an industrial zone?

A. Besides using a dedicated firewall / DMZ construction use an IOS based firewall on the WAN router connecting the industrial site to the Internet.
B. Use NTP to make sure that time stamps of log messages are synchronized such that you can do root cause analysis.
C. Deploy an IDS solution with knowledge about industrial protocols in the industrial zone in combination with a firewall.
D. Use multiple firewalls from different vendors in such a way that network traffic will have to traverse both firewalls so that security holes of one firewall is caught by the other firewall.

Answer: C

QUESTION 63
Which statement is correct regarding Media Redundancy Protocol (MRP) in a ring of ProfiNET devices?

A. When a link fault is detected, MRP rings must converge in less than 100 milliseconds
B. MRP defines two device roles, Media Redundancy Master and Media Redundancy Client
C. MRP can support rings of up to 250 devices
D. MRP is only supported on network switches

Answer: B

QUESTION 64
Refer to the exhibit. What issue does this topology present for the represented traffic flow?

A. Standard Produce/Consume traffic is not suitable for an 802.11 wireless environment.
B. Only one of the Work Group Bridges can transmit at a time, because 802.11 is half duplex.
C. The Converged Plant-wide Ethernet best practices for 802.11 wireless don’t allow for PAC to PAC traffic.
D. I/O control traffic should utilize the 2.4 GHz band based on best practices.

Answer: B

QUESTION 65
A ProfiNET management system operator is unable to add a ProfiNET Conformance Class B device to a SIMATIC management station. The device is connected to interface FastEthernet1/3. Based on the provided CLI output, which statement is correct?
switch#show profinet lldp
Fa1/1 port-003-00000 On
Fa1/2 port-004-00000 On
Fa1/3 port-005-00000 Off
Fa1/4 port-006-00000 Off
Fa1/5 port-007-00000 On
Fa1/6 port-008-00000 Off
Fa1/7 port-009-00000 On
Fa1/8 port-010-00000 Off

A. LLDP has been disabled on this switch
B. The connected device is not sending LLDP packets with ProfiNET extensions
C. The port label needs to be changed on interface FastEthernet 1/3 to “port-003-00000”
D. ProfiNET is disabled on this switch

Answer: B

QUESTION 66
A cookie cutter machine requires 2 standard controllers and a safety controller. All of these controllers and machine level I/O have been placed on VLAN 104. The safety controller must monitor an emergency stop connected to an I/O adapter on an adjacent machine (VLAN 105). Which packet type will be used?

A. UDP Multicast TTL = 1
B. UDP Multicast TTL = 2
C. UDP Unicast
D. TCP Unicast

Answer: C

QUESTION 67
Profinet has been disabled on a Cisco Industrial Ethernet switch, which CLI commands correctly enable ProfiNET on VLAN 10?

A. switch(config)#profinet
switch(config)#profinet vlan 10
B. switch#enable profinet
switch(config)#profinet vlan 10
C. switch(config)#profinet
switch(config)#vlan 10
switch(config-vlan)#profinet
D. switch#enable profinet
switch(config)#vlan 10
switch(config-vlan)#profinet

Answer: A


!!!REDOMMEND!!!

1.|2018 Latest 200-601 Exam Dumps (PDF & VCE) 90Q Download:
https://www.braindump2go.com/200-601.html

2.|2018 Latest 200-601 Study Guide Video:

https://youtu.be/07100ZztBOA

2018 May New Cisco 200-601 Exam Dumps with PDF and VCE Just Updated Today! Following are some new 200-601 Real Exam Questions:

1.|2018 Latest 200-601 Exam Dumps (PDF & VCE) 90Q Download:
https://www.braindump2go.com/200-601.html

2.|2018 Latest 200-601 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/0B75b5xYLjSSNWTIxdF9WZmZqMms?usp=sharing

QUESTION 46
It is common to use Resilient Ethernet Protocol (REP) on the manufacturing floor as a resiliency protocol, as opposed to the Enterprise where it is not generally deployed. What are two reasons why REP is more suitable for the plant floor? (Choose two)

A. REP is only supported on Industrial Ethernet switches, it is not supported on Catalyst switches.
B. REP converges faster than Spanning Tree, allowing for greater network availability.
C. REP supports Industrial Ethernet protocols better because it moves the packets faster.
D. Running dual cables from access switches to an aggregation switch can have a much higher cost on the plant floor than in the Enterprise and running a ring protocol like REP provides resiliency at a lower cost.
E. Industrial protocols can be negatively impacted by the number of nodes the Ethernet frame traverses, REP provides a topology with no more than 3 nodes for any data path.

Answer: BD

QUESTION 47
Which scenario represents the correct configuration to support the SSIDs of this autonomous access point?

A. Missing
B. Missing
C. Missing
D. Missing

Answer: D

QUESTION 48
In which two ways could you minimize the impact of monitoring an industrial network? (Choose two.)

A. Send random messages to a device and see what the response is.
B. Do frequent ping sweeps to industrial devices to check for their proper operations.
C. Make a copy of all the network traffic and analyze it offline.
D. Use an industrial-network-grade IDS-IPS system.

Answer: CD

QUESTION 49
Which option best describes the ProfiNET Discovery and Configuration Protocol (DCP)?

A. Can be used to override both static and dynamically (DHCP/BOOTP) assigned IP addresses
B. Cannot be used to reset a device to factory defaults
C. Is only supported in Conformance Class B and C devices
D. Uses the ProfiNET-IRT communication class

Answer: A

QUESTION 50
When troubleshooting a high packet loss condition in the network, the inspection area has an assessed M.I.C.E. value of M=1, I=1, C=3 and E=1. Which condition could be suspect?

A. Use of shielded Patch Cables, Bonded on one end only.
B. Use of unshielded Patch Cables.
C. Broken seal on bulkhead connector.
D. Oxidation on Shielded RJ45 Patch Plug

Answer: D

QUESTION 51
Refer to the exhibit. You are required to implement traffic segmentation in the network. See the table for relevant device details:

L2SW4, L2SW5, and L2SW6 are connected to L3SW1 with 802.1Q trunks with VLAN 191 and VLAN 398 allowed on the trunk.
You have the following information from L3SW1:
L3SW1# show run interfaces
interface Vlan1
no ip address
shutdown
!
interface Vlan2
ip address 10.2.2.2 255.255.255.248
!
interface Vlan191
ip address 10.10.27.126 255.255.255.192
!
interface Vlan200
ip address 10.20.20.1 255.255.255.248
!
interface Vlan398
ip address 10.15.153.1 255.255.255.0
L3SW1# show ip route
*** Output Omitted ***
10.0.0.0/8 is variably subnetted, 5 subnets, 3 masks
C 10.2.2.1/29 is directly connected, Vlan2
C 10.10.27.64/26 is directly connected, Vlan191
C 10.15.153.0/24 is directly connected, Vlan398
C 10.20.20.0/29 is directly connected, Vlan200
S 10.200.200.0/24 [1/0] via 10.20.20.2
S* 0.0.0.0/0 [1/0] via 10.2.2.1
You are required to implement a configuration that will meet the following connectivity requirements:
– The Administrator’s Station must have full access to PanelView
– PanelView should have limited access, based on specific TCP ports, to PLC#1 and I/O#1
– The Administrator’s Station should have no access to PLC#1 and I/O#1
– PLC#1 and I/O#1 should be able to communicate with each other on any port
Which action will allow you to meet the connectivity requirements?

A. Put interface VLAN 191 and interface VLAN 398 into different Virtual Routing and Forwarding (VRF) instances on L3SW1
B. Deploy an inbound ACL on interface VLAN 191 to control the traffic from the Administrator’s Station and PanelView to PLC#1 and I/O#1
C. No change is required, the traffic is already limited appropriately by the VLAN segmentation
D. Implement an ACL on Firewall1 to control the traffic flow between VLAN 191 and VLAN

Answer: B

QUESTION 52
It is determined that an intermittent high packet loss event is occurring within a segment of the network. The assigned task is to determine the cause.
Which of these conditions should be suspected?

A. Missing
B. Missing
C. Missing
D. Missing

Answer: D

QUESTION 53
You have been tasked to design an Ethernet network capable of Motion control with cycle times not to exceed 1ms. In order to create a more deterministic network, what characteristic/s should you primarily focus on?

A. Lattency and Jitter
B. Redundancy and high availability
C. Explicit and Implicit messaging
D. This cycle time is not possible on an Ethernet network
E. Gigabit port speed

Answer: A

QUESTION 54
ProfiNET has been disabled on a Cisco Industrial Ethernet switch. Which CLI command will correctly enable ProfiNET on the switch?

A. switch(config)#profinet
B. switch(config-if)#switchport profinet vlan 10
C. switch(config)#vlan 10 profinet
D. switch#enable profinet

Answer: A

QUESTION 55
Which describes a best practice rule for controlling traffic between the corporate network and the controls network?

A. Outbound traffic from the control network to the corporate network and outbound traffic from the corporate network to the control network can be restricted based on source and destination address only.
B. Outbound traffic from the corporate network to the control network should be restricted but outbound traffic from the control network to the corporate network should not be restricted.
C. Outbound traffic from the control network to the corporate network should be restricted based on source and destination address and service only.
D. Outbound traffic from the control network to the corporate network should be restricted based on source and destination address, service, and port.

Answer: D

QUESTION 56
Which statement is true regarding ProfiSAFE?

A. ProfiSAFE traffic must be carried on a network that is physically separated from automation traffic
B. ProfiSAFE relies on the error detection mechanisms of Ethernet and TCP/IP to determine if there are network errors
C. ProfiSAFE can be used in safety applications up to Safety Integrity Level 3 (SIL3)
D. ProfiSAFE is only used by ProfiBUS PA and ProfiBUS DA devices

Answer: C


!!!REDOMMEND!!!

1.|2018 Latest 200-601 Exam Dumps (PDF & VCE) 90Q Download:
https://www.braindump2go.com/200-601.html

2.|2018 Latest 200-601 Study Guide Video:

https://youtu.be/07100ZztBOA

2018 May New Cisco 300-206 Exam Dumps with PDF and VCE Just Updated Today! Following are some new 300-206 Real Exam Questions:

1.|2018 Latest 300-206 Exam Dumps (PDF & VCE) 315Q Download:
https://www.braindump2go.com/300-206.html

2.|2018 Latest 300-206 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/0B75b5xYLjSSNOXZTcmdGNEh2UU0?usp=sharing

QUESTION 133
You have installed a web server on a private network. Which type of NAT must you implement to enable access to the web server for public Internet users?

A. static NAT
B. dynamic NAT
C. network object NAT
D. twice NAT

Answer: A

QUESTION 134
Which type of object group will allow configuration for both TCP 80 and TCP 443?

A. service
B. network
C. time range
D. user group

Answer: A

QUESTION 135
When you configure a Botnet Traffic Filter on a Cisco firewall, what are two optional tasks? (Choose two.)

A. Enable the use of dynamic databases.
B. Add static entries to the database.
C. Enable DNS snooping.
D. Enable traffic classification and actions.
E. Block traffic manually based on its syslog information.

Answer: BE

QUESTION 136
Refer to the exhibit. What is the effect of this configuration?

A. The firewall will inspect IP traffic only between networks 192.168.1.0 and 192.168.2.0.
B. The firewall will inspect all IP traffic except traffic to 192.168.1.0 and 192.168.2.0.
C. The firewall will inspect traffic only if it is defined within a standard ACL.
D. The firewall will inspect all IP traffic.

Answer: A

QUESTION 137
When you configure a Cisco firewall in multiple context mode, where do you allocate interfaces?

A. in the system execution space
B. in the admin context
C. in a user-defined context
D. in the global configuration

Answer: A

QUESTION 138
At which layer does Dynamic ARP Inspection validate packets?

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 7

Answer: A

QUESTION 139
Which feature can suppress packet flooding in a network?

A. PortFast
B. BPDU guard
C. Dynamic ARP Inspection
D. storm control

Answer: D

QUESTION 140
What is the default violation mode that is applied by port security?

A. restrict
B. protect
C. shutdown
D. shutdown VLAN

Answer: C

QUESTION 141
What are two security features at the access port level that can help mitigate Layer 2 attacks? (Choose two.)

A. DHCP snooping
B. IP Source Guard
C. Telnet
D. Secure Shell
E. SNMP

Answer: AB

QUESTION 142
At which layer does MACsec provide encryption?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

Answer: B

QUESTION 143
What are two enhancements of SSHv2 over SSHv1? (Choose two.)

A. VRF-aware SSH support
B. DH group exchange support
C. RSA support
D. keyboard-interactive authentication
E. SHA support

Answer: AB


!!!REDOMMEND!!!
1.|2018 Latest 300-206 Exam Dumps (PDF & VCE) 315Q Download:
https://www.braindump2go.com/300-206.html

2.|2018 Latest 300-206 Study Guide Video:
https://youtu.be/_WvexFqQgoA

2018 May New Cisco 300-206 Exam Dumps with PDF and VCE Just Updated Today! Following are some new 300-206 Real Exam Questions:

1.|2018 Latest 300-206 Exam Dumps (PDF & VCE) 315Q Download:
https://www.braindump2go.com/300-206.html

2.|2018 Latest 300-206 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/0B75b5xYLjSSNOXZTcmdGNEh2UU0?usp=sharing

QUESTION 119
Which two configurations are necessary to enable password-less SSH login to an IOS router? (Choose two.)

A. Enter a copy of the administrator’s public key within the SSH key-chain
B. Enter a copy of the administrator’s private key within the SSH key-chain
C. Generate a 512-bit RSA key to enable SSH on the router
D. Generate an RSA key of at least 768 bits to enable SSH on the router
E. Generate a 512-bit ECDSA key to enable SSH on the router
F. Generate a ECDSA key of at least 768 bits to enable SSH on the router

Answer: AD

QUESTION 120
Which two features does Cisco Security Manager provide? (Choose two.)

A. Configuration and policy deployment before device discovery
B. Health and performance monitoring
C. Event management and alerting
D. Command line menu for troubleshooting
E. Ticketing management and tracking

Answer: BC

QUESTION 121
An administrator installed a Cisco ASA that runs version 9.1. You are asked to configure the firewall through Cisco ASDM.
When you attempt to connect to a Cisco ASA with a default configuration, which username and password grants you full access?

A. admin / admin
B. asaAdmin / (no password)
C. It is not possible to use Cisco ASDM until a username and password are created via the username usernamepassword password CLI command.
D. enable_15 / (no password)
E. cisco / cisco

Answer: D

QUESTION 122
Which three options are default settings for NTP parameters on a Cisco ASA? (Choose three.)

A. NTP authentication is enabled.
B. NTP authentication is disabled.
C. NTP logging is enabled.
D. NTP logging is disabled.
E. NTP traffic is not restricted.
F. NTP traffic is restricted.

Answer: BDE

QUESTION 123
Which two options are purposes of the packet-tracer command? (Choose two.)

A. to filter and monitor ingress traffic to a switch
B. to configure an interface-specific packet trace
C. to simulate network traffic through a data path
D. to debug packet drops in a production network
E. to automatically correct an ACL entry in an ASA

Answer: CD

QUESTION 124
Refer to the exhibit. Server A is a busy server that offers these services:
– World Wide Web
– DNS
Which command captures http traffic from Host A to Server A?

A. capture traffic match udp host 10.1.1.150 host 10.2.2.100
B. capture traffic match 80 host 10.1.1.150 host 10.2.2.100
C. capture traffic match ip 10.2.2.0 255.255.255.192 host 10.1.1.150
D. capture traffic match tcp host 10.1.1.150 host 10.2.2.100
E. capture traffic match tcp host 10.2.2.100 host 10.1.1.150 eq 80

Answer: D

QUESTION 125
Your company is replacing a high-availability pair of Cisco ASA 5550 firewalls with the newer Cisco ASA 5555-X models. Due to budget constraints, one Cisco ASA 5550 will be replaced at a time.
Which statement about the minimum requirements to set up stateful failover between these two firewalls is true?

A. You must install the USB failover cable between the two Cisco ASAs and provide a 1 Gigabit Ethernet interface for state exchange.
B. It is not possible to use failover between different Cisco ASA models.
C. You must have at least 1 Gigabit Ethernet interface between the two Cisco ASAs for state exchange.
D. You must use two dedicated interfaces. One link is dedicated to state exchange and the other link is for heartbeats.

Answer: B

QUESTION 126
In which two modes is zone-based firewall high availability available? (Choose two.)

A. IPv4 only
B. IPv6 only
C. IPv4 and IPv6
D. routed mode only
E. transparent mode only
F. both transparent and routed modes

Answer: CD

QUESTION 127
You are the administrator of a multicontext transparent-mode Cisco ASA that uses a shared interface that belongs to more than one context. Because the same interface will be used within all three contexts, which statement describes how you will ensure that return traffic will reach the correct context?

A. Interfaces may not be shared between contexts in routed mode.
B. Configure a unique MAC address per context with the no mac-address auto command.
C. Configure a unique MAC address per context with the mac-address auto command.
D. Use static routes on the Cisco ASA to ensure that traffic reaches the correct context.

Answer: C

QUESTION 128
A rogue device has connected to the network and has become the STP root bridge, which has caused a network availability issue.
Which two commands can protect against this problem? (Choose two.)

A. switch(config)#spanning-tree portfast bpduguard default
B. switch(config)#spanning-tree portfast bpdufilter default
C. switch(config-if)#spanning-tree portfast
D. switch(config-if)#spanning-tree portfast disable
E. switch(config-if)#switchport port-security violation protect
F. switch(config-if)#spanning-tree port-priority 0

Answer: AC

QUESTION 129
According to Cisco best practices, which two interface configuration commands help prevent VLAN hopping attacks? (Choose two.)

A. switchport mode access
B. switchport access vlan 2
C. switchport mode trunk
D. switchport access vlan 1
E. switchport trunk native vlan 1
F. switchport protected

Answer: AB


!!!REDOMMEND!!!
1.|2018 Latest 300-206 Exam Dumps (PDF & VCE) 315Q Download:
https://www.braindump2go.com/300-206.html

2.|2018 Latest 300-206 Study Guide Video:
https://youtu.be/_WvexFqQgoA

2018 May New Cisco 300-206 Exam Dumps with PDF and VCE Just Updated Today! Following are some new 300-206 Real Exam Questions:

1.|2018 Latest 300-206 Exam Dumps (PDF & VCE) 315Q Download:
https://www.braindump2go.com/300-206.html

2.|2018 Latest 300-206 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/0B75b5xYLjSSNOXZTcmdGNEh2UU0?usp=sharing

QUESTION 108
When you set a Cisco IOS Router as an SSH server, which command specifies the RSA public key of the remote peer when you set the SSH server to perform RSA-based authentication?

A. router(config-ssh-pubkey-user)#key
B. router(conf-ssh-pubkey-user)#key-string
C. router(config-ssh-pubkey)#key-string
D. router(conf-ssh-pubkey-user)#key-string enable ssh

Answer: B

QUESTION 109
Enabling what security mechanism can prevent an attacker from gaining network topology information from CDP via a man-in-the-middle attack?

A. MACsec
B. Flex VPN
C. Control Plane Protection
D. Dynamic Arp Inspection

Answer: A

QUESTION 110
On an ASA running version 9.0, which command is used to nest objects in a pre-existing group?

A. object-group
B. network group-object
C. object-group network
D. group-object

Answer: D

QUESTION 11
Which ASA feature is used to keep track of suspected attackers who create connections to too many hosts or ports?

A. complex threat detection
B. scanning threat detection
C. basic threat detection
D. advanced threat detection

Answer: B

QUESTION 112
What is the default behavior of an access list on a Cisco ASA?

A. It will permit or deny traffic based on the access list criteria.
B. It will permit or deny all traffic on a specified interface.
C. It will have no affect until applied to an interface, tunnel-group or other traffic flow.
D. It will allow all traffic.

Answer: C

QUESTION 113
When configuring a new context on a Cisco ASA device, which command creates a domain for the context?

A. domain config name
B. domain-name
C. changeto/domain name change
D. domain context 2

Answer: B

QUESTION 114
Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?

A. Enable DNS snooping, traffic classification, and actions.
B. Botnet Traffic Filtering is not supported in transparent mode.
C. Enable the use of the dynamic database, enable DNS snooping, traffic classification, and actions.
D. Enable the use of dynamic database, enable traffic classification and actions.

Answer: C

QUESTION 115
Which Cisco switch technology prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast flood on a port?

A. port security
B. storm control
C. dynamic ARP inspection
D. BPDU guard
E. root guard
F. dot1x

Answer: B

QUESTION 116
You are a security engineer at a large multinational retailer. Your Chief Information Officer recently attended a security conference and has asked you to secure the network infrastructure from VLAN hopping.
Which statement describes how VLAN hopping can be avoided?

A. There is no such thing as VLAN hopping because VLANs are completely isolated.
B. VLAN hopping can be avoided by using IEEE 802.1X to dynamically assign the access VLAN to all endpoints and setting the default access VLAN to an unused VLAN ID.
C. VLAN hopping is avoided by configuring the native (untagged) VLAN on both sides of an ISL trunk to an unused VLAN ID.
D. VLAN hopping is avoided by configuring the native (untagged) VLAN on both sides of an IEEE 802.1Q trunk to an unused VLAN ID.

Answer: D

QUESTION 117
You are the administrator of a Cisco ASA 9.0 firewall and have been tasked with ensuring that the Firewall Admins Active Directory group has full access to the ASA configuration. The Firewall Operators Active Directory group should have a more limited level of access.
Which statement describes how to set these access levels?

A. Use Cisco Directory Agent to configure the Firewall Admins group to have privilege level 15 access. Also configure the Firewall Operators group to have privilege level 6 access.
B. Use TACACS+ for Authentication and Authorization into the Cisco ASA CLI, with ACS as the AAA server. Configure ACS CLI command authorization sets for the Firewall Operators group.
Configure level 15 access to be assigned to members of the Firewall Admins group.
C. Use RADIUS for Authentication and Authorization into the Cisco ASA CLI, with ACS as the AAA server. Configure ACS CLI command authorization sets for the Firewall Operators group.
Configure level 15 access to be assigned to members of the Firewall Admins group.
D. Active Directory Group membership cannot be used as a determining factor for accessing the Cisco ASA CLI.

Answer: B

QUESTION 118
A router is being enabled for SSH command line access.
The following steps have been taken:
– The vty ports have been configured with transport input SSH and login local.
– Local user accounts have been created.
– The enable password has been configured.
What additional step must be taken if users receive a ‘connection refused’ error when attempting to access the router via SSH?

A. A RSA keypair must be generated on the router
B. An access list permitting SSH inbound must be configured and applied to the vty ports
C. An access list permitting SSH outbound must be configured and applied to the vty ports
D. SSH v2.0 must be enabled on the router

Answer: A


!!!REDOMMEND!!!
1.|2018 Latest 300-206 Exam Dumps (PDF & VCE) 315Q Download:
https://www.braindump2go.com/300-206.html

2.|2018 Latest 300-206 Study Guide Video:
https://youtu.be/_WvexFqQgoA