1.
Which of the following actions could you take to mitigate VLAN hopping attacks? (Select the best answer.)
2.
Which of the following devices typically sits inline? (Select the best answer.)
3.
Which of the following statements is true regarding a stateless packetfiltering firewall? (Select the best answer.)
4.
An SNMP readonly community named READONLY is configured on a Cisco router. Which of the following fields in the output of the show snmp command on the router will increment if an NMS makes a set request to the READONLY community? (Select the best answer.)
5.
Which of the following statements is true of all firewalls? (Select the best answer.)
6.
You issue the following block of commands on a Cisco router:
RouterA(config)#privilege exec level 10 show users
RouterA(config)#username boson password cisco
RouterA(config)#username boson privilege 15
RouterA(config)#username boson autocommand show users
RouterA(config)#line vty 0 4
RouterA(configline)#login local
RouterA(configline)#privilege level 7
Which of the following statements accurately describes what happens when the user boson successfully initiates a Telnet session to RouterA? (Select the best answer.)
7.
You administer the network shown above. SwitchE is the root bridge for the network. You connect SwitchF to a port on SwitchB. SwitchF has a priority value of 0 and the MAC address 0000.0c42.0729. Which statement is most accurate regarding root bridge selection after SwitchF is connected to SwitchB? (Select the best answer.)
8.
Which of the following statements is true regarding the outbreak control feature of AMP for Endpoints? (Select the best answer.)
9.
You want to use ASDM to create an inspection rule that will drop and log SHOUTcast media streams. Which of the following inspection rules should you configure to achieve your goal? (Select the best answer.)
10.
On which of the following screens in ASDM can you enable users to select which connection profile they will use when they establish a clientless SSL VPN connection? (Select the best answer.)