1.
Which of the following commands will configure a static pointtopoint VTI tunnel to use 128bit encryption? (Select the best answer.)
2.
Which of the following is true of BPDU traffic on a Cisco zonebased firewall in transparent mode? (Select the best answer.)
3.
You issue the following command on a Cisco device: test aaa group radius user1 b0s0n newcode profile profile1 Which of the following is true? (Select the best answer.)
4.
Which of the following is least likely to be a function of a Cisco ESA? (Select the best answer.)
5.
You upload a file named isitbad.zip to AMP for analysis. While reviewing the AMP logs, you receive the following output:
Wed Feb 17 12:41:05 2015 Info: File reputation query initiating. File Name =
'isitbad.zip', MID = 852, File Size = 174401 bytes, File Type = application/zipWed
Feb 17 12:41:10 2015 Info: Response received for file reputation query from Cloud.
File Name = 'isitbad.zip', MID = 852, Disposition = unscannable,
Malware = None, Reputation Score = 0, sha256 =
78d80f8fb0e6eaa2988d11607ec6a00840147f8188f6db8b7d00d907440d7aaa, upload_action = 1
Which of the following is true? (Select the best answer.)
6.
You are troubleshooting IPSec VPN connectivity between two sites. From the local router, you are able to ping the remote tunnel endpoint. Which of the following steps should you perform next? (Select the best answer.)
7.
You have configured a Cisco ESA with a URL Category action that redirects the URLs of adult content sites to the Cisco Cloud Web Security proxy service. You receive a report that users are successfully accessing some adult content sites from the company network. However, you are able to verify that known adult sites are being redirected. Which of the following could be the problem? (Select the best answer.)
8.
An inbound TCP packet arrives at the ingress interface of a Cisco ASA 8.2 firewall. The packet is part of an established session. The packet reaches the interface's internal buffer and the input counter is incremented. Which of the following actions will occur next? (Select the best answer.)
9.
Which of the following is not an attribute on which an ISE MDM policy can be based? (Select the best answer.)
10.
Which of the following features are supported on a Cisco ASA operating in multiple context mode? (Select 2 choices.)