Secure III

Is this your test? Login to manage it. If not, you can build a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
To prevent a spanning-tree attack, which command should be configured on a distribution switch port that is connected to an access switch?
2.
1 point
In a GETVPN solution, which two ways can the key server distribute the new keys to the group members during the rekey process?
3.
1 point
You are a network administrator and are moving a web server from inside the company network to a DMZ segment that is located on a Cisco router. The web server was located at IP address 172.16.10.50 on the inside and changed to the IP address 172.20.10.5 on the DMZ. Additionally, you are moving the web port to 8080 but do not want your inside users to be affected. Which NAT statement should you configure on your router to support the change?
4.
1 point
When configuring NAT, and your solution requires the ability to see the inside local and outside global address entries and any TCP or UDP port in the show ip nat command output, how should
NAT be configured on the router?
5.
1 point
Refer to the exhibit 105

You are working for a corporation that has connected its network to a partner network. Based on this partial configuration that is supplied in the exhibit, which two things happen to traffic that is inbound from the partner network (outside is 10.10.30.0/24) and the return traffic from the inside as it travels through this router? (Choose two.)
6.
1 point
You are a network administrator that is deploying a Cisco router that needs to support both PAT and site-to-site VPN on one public IP address. In order to make both work simultaneously, how should the NAT configuration be set up?
7.
1 point
Refer to the exhibit 107

Based on the configuration that is shown in the exhibit, select the three answers that apply.
(Choose three.)
8.
1 point
You are finding that the 802.1X-configured ports are going into the error-disable state. Which command will show you the reason why the port is in the error-disable state, and which command will automatically be re-enabled after a specific amount of time? (Choose two.)
9.
1 point
Your company has a requirement that if security is compromised on phase 1 of a Diffie-Hellman key exchange that a secondary option will strengthen the security on the IPsec tunnel. What should you implement to ensure a higher degree of key material security?
10.
1 point
Which solution on a Cisco router requires the loading of a protocol header definition file (PHDF)?
11.
1 point
You are troubleshooting a problem for which end users are reporting connectivity issues. Your network has been configured with Layer 2 protection controls. You have determined that the DHCP snooping database is correct and that proper static addressing maps have been configured. Which of these should be your next step in troubleshooting this problem?
12.
1 point
You are troubleshooting a reported connectivity issue from a remote office whose users are accessing corporate headquarters via an IPsec VPN connection. You issued a show crypto isakmp sa command on the headend router, and the state has MM_NO_STATE. Which debug command should you enter next, and which part of the VPN tunnel establishment process is failing? (Choose two.)
13.
1 point
You are installing a brand-new, site-to-site VPN tunnel and notice that it is not working correctly. When connecting to the corporate router and issuing a show crypto ipsec sa command, you notice that for this particular SA that packets are being encrypted but not decrypted. What are two potential reasons for this problem? (Choose two.)
14.
1 point
Which two of these are features of control plane security on a Cisco ISR? (Choose two.)
15.
1 point
Which additional configuration steps are required for a zone-based policy firewall to operate in a VRF scenario?
16.
1 point
You are troubleshooting an IPsec VPN problem. During debugging of IPsec operations, you see the message "attributes not acceptable" on the IKE responder after issuing the debug crypto
isakmp command. Which step should you take next?
17.
1 point
Which state is a Cisco IOS IPS signature in if it does not take an appropriate associated action even if it has been successfully compiled?
18.
1 point
Which CLI command would you use to verify installed SSL VPN licensing on a Cisco 1900, 2900, or 3900 Series ISR?
19.
1 point
Which statement is correct regarding GRE tunnel endpoints when you are configuring GRE over IPsec?
20.
1 point
Refer to the exhibit 120

Which of these is correct regarding the configuration parameters shown?
21.
1 point
Refer to the exhibit 121

When you are using dynamic IPsec VTI tunnels, what can you determine about virtual-access
interfaces from the output shown?
22.
1 point
Refer to the exhibit 122

Based on the partial configuration shown, which additional configuration parameter is needed under the GET VPN group member GDOI configuration?