1.
Which of the following is an outputspreading technique that spammers use to manipulate reputation scores and defeat filters? (Select the best answer.)
2.
You are configuring dynamic PAT on a Cisco ASA 5500 using the CLI. The ASA is running software version 8.3.
Which of the following IP addresses can you configure inline? (Select the best answer.)
3.
Your company's active ASA currently shares its stateful failover link with a regular data interface. Your supervisor asks you to configure a failover key on both the active ASA and the standby ASA.
Which of the following is most likely the reason? (Select the best answer.)
4.
You have configured a BYOD implementation at a branch location, including an extended ACL named DEFAULTACL on the Layer 2 ports of each access switch.
BYOD clients are able to obtain IP addresses, but connectivity to other network services seems to be sporadic or nonexistent, depending on the service.
You issue the show ip accesslist command on the switch and receive the following partial output:
Extended IP access list DEFAULTACL
10 permit icmp any any
20 permit udp any eq bootpc any eq bootpc
30 permit udp any any eq tftp
40 deny ip any any log
According to Cisco BYOD best practices, which of the following should you perform on the ACL to fix the problem? (Select the best answer.)
5.
You enable logging at the end of the session in Cisco FireSIGHT Management Center.
Which of the following is true? (Select the best answer.)
6.
Which of the following MPF elements can be used to configure Application layer protocol inspection? (Select the best answer.)
7.
To which of the following are you most likely to connect to manage a Cisco router in ROMmon mode? (Select 2 choices.)
8.
Which of the following is most likely to protect the availability component of the CIA triad? (Select the best answer.)
9.
Which of the following ISAKMP states indicates that the IKE peers have negotiated security parameters and exchanged keys using aggressive mode during phase
1 of the IKE process? (Select the best answer.)

 
10.
You have been asked to enable the Cisco IOS Resilient Configuration feature on a Cisco router. You issue the following commands on the router:
Router#configure terminal
Router(config)#secure boot-image
Which of the following commands are you most likely to issue next to complete the configuration? (Select the best answer.)