Implementing Cisco Edge Network Security Solutions 試験
Question No : 1
When you configure a Cisco firewall in multiple context mode, where do you allocate interfaces?
Question No : 2
Which three statements about transparent firewall are true? ( Choose three)
Question No : 3
Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?
Question No : 4
IPv6 addresses in an organization's network are assigned using Stateless Address Autoconfiguration. What is a security concern of using SLAAC for IPv6 address assignment?
Question No : 5
Which configuration keyword will configure SNMPv3 with authentication but no encryption?
Question No : 6
Which five options are valid logging destinations for the Cisco ASA? (Choose five.)
Question No : 7
Which three logging methods are supported by Cisco routers? (Choose three.)
Question No : 8
Refer to the exhibit.
Which two statements about this firewall output are true? (Choose two.)
Question No : 9
What is the default behavior of an access list on a Cisco ASA?
Question No : 10
Which feature can suppress packet flooding in a network?
Question No : 11
Which feature is a limitation of a Cisco ASA 5555-X running 8.4.5 version with multiple contexts?
Question No : 12
Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)
Question No : 13
Which product can manage licenses, updates, and a single signature policy for 15 separate IPS appliances?
Question No : 14
A rogue device has connected to the network and has become the STP root bridge, which has caused a network availability issue.
Which two commands can protect against this problem? (Choose two.)
Question No : 15
What can you do to enable inter-interface firewall communication for traffic that flows
between two interfaces of the same security level?