Secure I-50

Is this your test? Login to manage it. If not, you can build a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What is the result of configuring the command dotlx system-auth-control on a Cisco Catalyst switch?
2.
1 point
which define the security protection features of the control plane of the Cisco layer 2/3 multilayer Catalyst switches?
3.
1 point
Refer to the IMAGE 27. Based on the partial configuration shown, which the GET VPN group member
GDOI configuration?
4.
1 point
Refer to IMAGE 3. Which two Cisco IOS WebVPN features are enabled with the partial configuration shown? (2)
5.
1 point
Refer to the IMAGE 17. The INSIDE zone has been configured and assigned to two separate router
interfaces. All other zones and interfaces have been properly configured. Given the configuration
example shown, what can be determined?
6.
1 point
You are troubleshooting a problem related to IPsec connectivity issues. You see that there is no ISAKMP security association established between peers. You debug the connection process and see an error message of 1d00h: ISAKMP (0:1): atts are not acceptable. Next payload is 0. What does this message indicate?
7.
1 point
Refer to the IMAGE 32. What can be determined from the output of this show command?
8.
1 point
Which information is displayed when you enter the Cisco IOS command show epm session?
9.
1 point
When using Cisco Easy VPN, what are the three options for entering an XAUTH username and
password for establishing a VPN connection from the Cisco Easy VPN remote router? (Choose
three.)
10.
1 point
Features of the Cisco Secure ACS when implementing 802.1x
11.
1 point
Which two types of deployments can be implemented for a zone-based policy firewall? (Choose two.)
12.
1 point
Which of these is an implementation guideline when deploying the IP Source Guard feature in an environment with multiple switches?
13.
1 point
Which Cisco IOS IPS feature allows to you remove one or more actions from all active signatures
based on the attacker and/or target address criteria, as well as the event risk rating criteria?
14.
1 point
A user has requested a connection to an external website. After initiating the connection, a message appears in the user's browser stating that access to the requested website has been
denied by the company usage policy. What is the most likely reason for this message to appear?
15.
1 point
Which statement best describes inside policy based NAT?
16.
1 point
Which of these allows you to add event actions globally based on the risk rating of each event, without having to configure each signature individually?
17.
1 point
When 802.1X is implemented, how do the client (supplicant) and authenticator communicate?
18.
1 point
1 show crypto map
2 show crypto isakmp sa
3 clear crypto sa
4 show crypto isakmp policy
5 clear crypto isakmp
6 show crypto ipsec sa
7 show crypto ipsec transform-set


a Delete IPsec security association
b Verify cryptographic configurations and show SA lifetimes
c Verify the IPsec protection policy settings
d Verify current IPsec settings in use by the SAs
e Clear active IKE connections
19.
1 point
Refer to the IMAGE 46. Given the partial configuration shown, what can be determined.
20.
1 point
Which of these is a result of using the same routing protocol process for routing outside and inside
the VPN tunnel?
21.
1 point
Which action does the command private-vlan association 100,200 take?
22.
1 point
What does the command errdisable recovery cause arp-inspection interval 300 provide for?
23.
1 point
Refer to the IMAGE 43. What can be determined from the configuration shown?
24.
1 point
Which represent mitigation techniques for VLAN hopping
25.
1 point
When configuring a zone-based policy firewall, what will be the resulting action if you do not specify any zone pairs for a possible pair of zones?
26.
1 point
Refer to IMAGE 10. What can be determined about the IPS category configuration shown?
27.
1 point
Which two of these are benefits of implementing a zone-based policy firewall in transparent mode
28.
1 point
When is it most appropriate to choose IPS functionality based on Cisco IOS software?
29.
1 point
Given the Cisco IOS command crypto key generate rsa label MY_KEYS modulus 2048, which additional command keyword should be added if you would like to use these keys on another router or have the ability to back them up to another device?
30.
1 point
When Cisco IOS IPS is configured to use SDEE for event notification, how are events managed?
31.
1 point
Which of these is correct regarding the configuration of virtual-access interfaces?
32.
1 point
You have configured Management Plane Protection on an interface on a Cisco router. What is the
resulting action on implementing MPP?
33.
1 point
Which best define app inspection and control benefits
34.
1 point
Which two of these will match a regular expression with the following configuration parameters?
[a-zA-Z][0-9][a-z] (Choose two.)
35.
1 point
NAT IMAGE 39
36.
1 point
Refer to IMAGE 6. What can be determined from the output of this show command?
37.
1 point
You have enabled Cisco IOS IPS on a router in your network. However, you are not seeing expected events on your monitoring system (such as Cisco IME). On the router, you see events being captured. What is the next step in troubleshooting the problem?
38.
1 point
Which of these is true regarding tunnel configuration when deploying a Cisco ISR as a DMVPN
hub router?
39.
1 point
Which command will enable a SCEP interface when you are configuring a Cisco router to be a
certificate server?
40.
1 point
Refer to the IMAGE 34- Given the output shown, what can be determined?
41.
1 point
You are running Cisco lOS IPS software on your edge router. A new threat has become an issue. The Cisco lOS IPS software has a signature that can address the new threat, but you previously retired the signature. You decide to unretire that signature to regain the desired protection level. How should you act on your decision?
42.
1 point
When performing NAT, which of these is a limitation you need to account for?
43.
1 point
Refer to the IMAGE 28. Given the partial configuration shown, which two statements are correct?
(Choose two.)
44.
1 point
Refer to IMAGE 1. Given the partial output of the debug command, what can be determined?
45.
1 point
Which of these is a configurable Cisco IOS feature that triggers notifications if an attack attempts
to exhaust critical router resources and if preventative controls have been bypassed or are not
working correctly?
46.
1 point
Refer to the IMAGE 37. Assuming that all other supporting configurations are correct, what can be determined from the partial IP admission configuration shown?
47.
1 point
You are troubleshooting reported connectivity issues from remote users who are accessing corporate headquarters via an IPsec VPN connection. What should be your first step in troubleshooting these issues?
48.
1 point
You are troubleshooting a Cisco Easy VPN installation that is experiencing session establishment problems. You have verified that matching IKE and IPsec polices exist on both peers. The remote client has also successfully entered authentication credentials. What is the next step to take in troubleshooting this problem?
49.
1 point
What information you should collect prior to deploying 802.1x auth in a Cisco IBNS environment (4)
50.
1 point
When enabling the Cisco IOS IPS feature, which step should you perform to prevent rogue signature updates from being installed on the router?