300-206 SENSS Flashcards
Which Cisco TrustSec role does a Cisco ASA firewall serve within an identity architecture? A. Access Requester B. Policy Decision Point C. Policy Information Point D. Policy Administration Point E. Policy Enforcement Point
E. Policy Enforcement Point
Which two features block traffic that is sourced from non-topological IPv6 addresses? (Choose two.) A. DHCPv6 Guard B. IPv6 Prefix Guard C. IPv6 RA Guard D. IPv6 Source Guard
B. IPv6 Prefix Guard
D. IPv6 Source Guard
Which Layer 2 security feature validates ARP packets? A. DAI B. DHCP server C. BPDU guard D. BPDU filtering
A. DAI
Must Log Into ASDM - Simulation
Which statement is true of the logging configuration on the Cisco ASA?
A. The contents of the internal buffer will be saved to an FTP server before the buffer is overwritten.
B. The contents of the internal buffer will be saved to flash memory before the buffer is overwritten.
C. System log messages with a severity level of six and higher will be logged to the internal buffer.
D. System log messages with a severity level of six and lower will be logged to the internal buffer.
Configuration/Device Management/Logging Setup and Logging Filters
C. System log messages with a severity level of six and higher will be logged to the internal buffer.
Which two options are purposes of the packet-tracer command? (Choose two.)
A. to filter and monitor ingress traffic to a switch
B. to configure an interface-specific packet trace
C. to simulate network traffic through a data path
D. to debug packet drops in a production network
E. to automatically correct an ACL entry in an ASA
C. to simulate network traffic through a data path
D. to debug packet drops in a production network
Which three options are default settings for NTP parameters on a Cisco device? (Choose three.) A. NTP authentication is enabled. B. NTP authentication is disabled. C. NTP logging is enabled. D. NTP logging is disabled. E. NTP access is enabled. F. NTP access is disabled.
B. NTP authentication is disabled.
D. NTP logging is disabled.
E. NTP access is enabled.
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config: access-group inside in interface inside access-list inside extended permit ip any 192.168.1.0 255.255.255.0
Which two statements about this firewall output are true? (Choose two.)
A. The output is from a packet tracer debug.
B. All packets are allowed to 192.168.1.0 255.255.0.0.
C. All packets are allowed to 192.168.1.0 255.255.255.0.
D. All packets are denied.
E. The output is from a debug all command.
A. The output is from a packet tracer debug.
C. All packets are allowed to 192.168.1.0 255.255.255.0.
Which three statements about transparent firewall are true? ( Choose three)
A. Transparent firewall works at Layer 2
B. Both interfaces must be configured with private IP Addresses
C. It can have only a management IP address
D. It does not support dynamic routing protocols
E. It only support PAT
A. Transparent firewall works at Layer 2
C. It can have only a management IP address
D. It does not support dynamic routing protocols
When configuring security contexts on the Cisco ASA, which three resource class limits can be set using a rate limit? (Choose three.)
A. address translation rate
B. Cisco ASDM session rate
C. connections rate
D. MAC-address learning rate (when in transparent mode)
E. syslog messages rate
F. stateful packet inspections rate
C. connections rate
E. syslog messages rate
F. stateful packet inspections rate
Which two web browsers are supported for the Cisco ISE GUI? (Choose two.)
A. HTTPS-enabled Mozilla Firefox version 3.x
B. Netscape Navigator version 9
C. Microsoft Internet Explorer version 8 in Internet Explorer 8-only mode
D. Microsoft Internet Explorer version 8 in all Internet Explorer modes
E. Google Chrome (all versions)
A. HTTPS-enabled Mozilla Firefox version 3.x
C. Microsoft Internet Explorer version 8 in Internet Explorer 8-only mode
Which function in the Cisco ADSM ACL Manager pane allows an administrator to search for a specfic element? A. Find B. Device Management C. Search D. Device Setup
A. Find
Which action is needed to set up SSH on the Cisco ASA firewall?
A. Create an ACL to aloew the SSH traffic to the Cisco ASA.
B. Configure DHCP for the client that will connect via SSH.
C. Generate a crypto key
D. Specify the SSH version level as either 1 or 2.
E. Enable the HTTP server to allow authentication.
C. Generate a crypto key
Which three options are hardening techniques for Cisco IOS routers? (Choose three.)
A. limiting access to infrastructure with access control lists
B. enabling service password recovery
C. using SSH whenever possible
D. encrypting the service password
E. using Telnet whenever possible
F. enabling DHCP snooping
A. limiting access to infrastructure with access control lists
C. using SSH whenever possible
D. encrypting the service password
You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations.
The CSO has tasked you with enable Botnet traffic filter on the Cisco ASA to detect and deny further connection attempts from infected PCs to malware destinations. You are also required to test your configurations by initiating connections through the Cisco ASA and then display and observe the Real-Time Log Viewer in ASDM.
1) Enable Botnet Updater Client and Use Botnet data dynamically downloaded from update server.
2) On global interface enable DNS Snooping
3) Under Traffic Settings for outside interface, Traffic Classified - All Traffic
Then Verify it is working
Which two statements about Cisco IOS Firewall are true? (Choose two.)
A. It provides stateful packet inspection.
B. It provides faster processing of packets than Cisco ASA devices provide.
C. It provides protocol-conformance checks against traffic.
D. It eliminates the need to secure routers and switches throughout the network.
E. It eliminates the need to secure host machines throughout the network.
A. It provides stateful packet inspection.
C. It provides protocol-conformance checks against traffic.
Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports? A. complex threat detection B. scanning threat detection C. basic threat detection D. advanced threat detection
B. scanning threat detection
Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)
A. Enable the EIGRP routing process and specify the AS number.
B. Define the EIGRP default-metric.
C. Configure the EIGRP router ID.
D. Use the neighbor command(s) to specify the EIGRP neighbors.
E. Use the network command(s) to enable EIGRP on the Cisco ASA interface(s).
A. Enable the EIGRP routing process and specify the AS number.
E. Use the network command(s) to enable EIGRP on the Cisco ASA interface(s).
A router is being enabled for SSH command line access.
The following steps have been taken:
-The vty ports have been configured with transport input SSH and login local.
-Local user accounts have been created.
-The enable password has been configured.
What additional step must be taken if users receive a ‘connection refused’ error when attempting to access the router via SSH?
A. A RSA keypair must be generated on the router
B. An access list permitting SSH inbound must be configured and applied to the vty ports
C. An access list permitting SSH outbound must be configured and applied to the vty ports
D. SSH v2.0 must be enabled on the router
A. A RSA keypair must be generated on the router
Where do you apply a control plane services policy to implement Management Plane Protection on a Cisco Router?
A. Control-plane router
B. Control-plane host
C. Control-plane interface management 0/0
D. Control-plane service policy
B. Control-plane host
What are three ways to add devices in Cisco Prime Infrastructure? (Choose three.) A. Use an automated process. B.Import devices from a CSV file. C.Add devices manually. D.Use RADIUS. E.Use the Access Control Server. F.Use Cisco Security Manager.
A. Use an automated process.
B.Import devices from a CSV file.
C.Add devices manually.
With Cisco ASA active/standby failover, by default, how many monitored interface failures will cause failover to occur? A. 1 B. 2 C. 3 D. 4 E. 5
A. 1
Which Cisco ASA object group type offers the most flexibility for grouping different services together based on arbitrary protocols? A. network B. ICMP C. protocol D. TCP-UDP E. service
E. service
Which type of object group will allow configuration for both TCP 80 and TCP 443? A. service B. network C. time range D. user group
A. service
Which two option are protocol and tools are used by management plane when using cisco ASA general management plane hardening? A. Unicast Reverse Path Forwarding B. NetFlow C. Routing Protocol Authentication D. Threat detection E. Syslog F. ICMP unreachables G. Cisco URL Filtering
B. NetFlow
E. Syslog