Which three statements about private VLANs are true?

Correct Answer for the Question – Which three statements about private VLANs are true? is given below Which three statements about private VLANs are true? (Choose three.)SHOW ANSWERS Isolated ports can talk to promiscuous and community ports. Promiscuous ports can talk to isolated and community ports. Private VLANs run over VLAN Trunking Protocol in client mode. … Read more

In which two modes is zone-based firewall high availability available?

Correct Answer for the Question – In which two modes is zone-based firewall high availability available? is given below In which two modes is zone-based firewall high availability available? (Choose two.)SHOW ANSWERS IPv4 only IPv6 only IPv4 and IPv6 routed mode only transparent mode only both transparent and routed modes Correct Answer The Correct Answer for … Read more

Which three options are default settings for NTP parameters on a Cisco device?

Correct Answer for the Question – Which three options are default settings for NTP parameters on a Cisco device? is given below Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)SHOW ANSWERS NTP authentication is enabled. NTP authentication is disabled. NTP logging is enabled. NTP logging is disabled. NTP access … Read more

How to set up that incoming traffic is going via same interface as outgoing traffic?

Correct Answer for the Question – How to set up that incoming traffic is going via same interface as outgoing traffic? is given below How to set up that incoming traffic is going via same interface as outgoing traffic? Intra-interface-anytime an ASA receives traffic on an interface and it is to route the traffic back out … Read more

Choose common L2 spoofing attacks (Choose 2)

Correct Answer for the Question – Choose common L2 spoofing attacks (Choose 2) is given below Choose common L2 spoofing attacks (Choose 2) DHCP snooping MAC spoofing Correct Answer The Correct Answer for this Question is DHCP snooping MAC spoofing Explanation The Question – Choose common L2 spoofing attacks (Choose 2) has been answered correctly and … Read more

Which set of commands creates a message list that includes all severity 2 (critical) messages on a Cisco security device?

Correct Answer for the Question – Which set of commands creates a message list that includes all severity 2 (critical) messages on a Cisco security device? is given below Which set of commands creates a message list that includes all severity 2 (critical) messages on a Cisco security device?console logging critical_messageslogging console critical_messageslogging console enable critical_messagesSHOW … Read more

Which five options are valid logging destinations for the Cisco ASA?

Correct Answer for the Question – Which five options are valid logging destinations for the Cisco ASA? is given below Which five options are valid logging destinations for the Cisco ASA? (Choose five.)SHOW ANSWERS AAA server Cisco ASDM buffer SNMP traps LDAP server email TCP-based secure syslog server Correct Answer The Correct Answer for this Question … Read more

Which four are IPv6 First Hop Security technologies?

Correct Answer for the Question – Which four are IPv6 First Hop Security technologies? is given below Which four are IPv6 First Hop Security technologies? (Choose four.)SHOW ANSWERS Send Dynamic ARP Inspection Router Advertisement Guard Neighbor Discovery Inspection Traffic Storm Control Port Security DHCPv6 Guard Correct Answer The Correct Answer for this Question is Dynamic ARP … Read more

Which two commands can protect against this problem?

Correct Answer for the Question – Which two commands can protect against this problem? is given below A rogue device has connected to the network and has become the STP root bridge, which has caused a network availability issue.Which two commands can protect against this problem? (Choose two.)SHOW ANSWERS switch(config)#spanning-tree portfast bpduguard default switch(config)#spanning-tree portfast bpdufilter … Read more