추가문제 Flashcards

(8 cards)

1
Q
Refer the exhibit
# ip http port 8080
#ip http secure-server

A. standard http port
B. standard https port
C. Secure connection over UDP 8080 port
D. Secure connection over TCP 8080 port

A

standard https port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two IPS triggers can you configure on a cisco IOS device ? (Choose two)

a. compute attack relevance
b. reset UDP connection
c. deny attacker inline
d. passive OS fingerprinting
e. reset TCP connection

A

deny attacker inline

reset TCP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two features of MDM are true? (Choose two)
A. It can secure email
B. It can eliminate the need for a SIM card in the device
C. It can remotely wipe sensitive data
D. It can provide mobile hotspot
E. It can encrypt wired communications

A

It can secure email

It can remotely wipe sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two benefits of a Cisco UCS system? (Choose two)
A. It provides a unified system for computing, networking and storage
B. It provides centralized visibility across public and private clouds
C. It offloads network storage to the public cloud
D. It can be managed through CLI, a GUI and a mobile app
E. It provides a lower cost of ownership than separate storage and computing platforms

A

It provides a unified system for computing, networking and storage

It provides a lower cost of ownership than separate storage and computing platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which component do you use to perform a device posture assessment in a BYOD solution?
A.Cisco Anyconnect VPN
B. Cisco ASA
C. WLAN Controller
D. Cisco ISE
A

Cisco ISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What is needed to create a site to site (S2S) VPN between two Cisco IOS devices:
A. Cisco AnyConnect
B. NTP
C. TACSAS+
D. RADIUS
E. CA
A

NTP

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Something about NTP. It shows the configuration of NTP including NTP trusted key and NTP authentication.
Device(config)#ntp authentication-key 1 md5 sometexthere
Device(config)#ntp authenticate
Device(config)#ntp trusted-key 1
Device(config)#ntp source GigabitEthernet0/0
Device(config)#ntp server X.X.X.X

A

about configure Device for trusted time source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which state is an indication of a successful ISAKMP negotiation on a S2S VPN?

a. IKE_QM_READY
b. IKE_QM_EXCH
c. IKE_READY
d. QM_IDLE

A

QM_IDLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly