Download CCNP Security Implementing Cisco Edge Network Security Solutions (SENSS).actualtests.300-206.2018-12-13.1e.186q.vcex

Download Exam

File Info

Exam Implementing Cisco Edge Network Security Solutions
Number 300-206
File Name CCNP Security Implementing Cisco Edge Network Security Solutions (SENSS).actualtests.300-206.2018-12-13.1e.186q.vcex
Size 2.22 Mb
Posted December 13, 2018
Downloads 45

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
Which set of commands enables logging and displays the log buffer on a Cisco ASA?

  • A: enable logging 
    show logging
  • B: logging enable 
    show logging
  • C: enable logging int e0/1 
    view logging
  • D: logging enable 
    logging view config



Question 2
Which command displays syslog messages on the Cisco ASA console as they occur?

  • A: Console logging <level>
  • B: Logging console <level>
  • C: Logging trap <level>
  • D: Terminal monitor
  • E: Logging monitor <level>



Question 3
Which set of commands creates a message list that includes all severity 2 (critical) messages on a Cisco security device?

  • A: logging list critical_messages level 2 
    console logging critical_messages
  • B: logging list critical_messages level 2 
    logging console critical_messages
  • C: logging list critical_messages level 2 
    logging console enable critical_messages
  • D: logging list enable critical_messages level 2 
    console logging critical_messages



Question 4
An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security mac-address sticky command? (Choose two.)

  • A: The configuration will be updated with MAC addresses from traffic seen ingressing the port. The configuration will automatically be saved to NVRAM if no other changes to the configuration have been made.
  • B: The configuration will be updated with MAC addresses from traffic seen ingressing the port. The configuration will not automatically be saved to NVRAM.
  • C: Only MAC addresses with the 5th most significant bit of the address (the 'sticky' bit) set to 1 will be learned.
  • D: If configured on a trunk port without the 'vlan' keyword, it will apply to all vlans.
  • E: If configured on a trunk port without the 'vlan' keyword, it will apply only to the native vlan.



Question 5
A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?

  • A: When the Cisco Unified Communications Manager cluster is in non-secure mode
  • B: When the Cisco Unified Communications Manager cluster is in secure mode only
  • C: When the Cisco Unified Communications Manager is not part of a cluster
  • D: When the Cisco ASA is configured for IPSec VPN



Question 6
Which two features are supported when configuring clustering of multiple Cisco ASA appliances? (Choose two.)

  • A: NAT
  • B: dynamic routing
  • C: SSL remote access VPN
  • D: IPSec remote access VPN



Question 7
When a Cisco ASA is configured in transparent mode, how can ARP traffic be controlled?

  • A: By enabling ARP inspection; however, it cannot be controlled by an ACL
  • B: By enabling ARP inspection or by configuring ACLs
  • C: By configuring ACLs; however, ARP inspection is not supported
  • D: By configuring NAT and ARP inspection



Question 8
What are two primary purposes of Layer 2 detection in Cisco IPS networks? (Choose two.)

  • A: identifying Layer 2 ARP attacks
  • B: detecting spoofed MAC addresses and tracking 802.1X actions and data communication after a successful client association
  • C: detecting and preventing MAC address spoofing in switched environments
  • D: mitigating man-in-the-middle attacks



Question 9
What is the primary purpose of stateful pattern recognition in Cisco IPS networks?

  • A: mitigating man-in-the-middle attacks
  • B: using multipacket inspection across all protocols to identify vulnerability-based attacks and to thwart attacks that hide within a data stream
  • C: detecting and preventing MAC address spoofing in switched environments
  • D: identifying Layer 2 ARP attacks



Question 10
What are two reasons to implement Cisco IOS MPLS Bandwidth-Assured Layer 2 Services? (Choose two.)

  • A: guaranteed bandwidth and peak rates as well as low cycle periods, regardless of which systems access the device
  • B: increased resiliency through MPLS FRR for AToM circuits and better bandwidth utilization through MPLS TE
  • C: enabled services over an IP/MPLS infrastructure, for enhanced MPLS Layer 2 functionality
  • D: provided complete proactive protection against frame and device spoofing






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset