1.
You issue the following command on a Cisco device: test aaa group radius user1 b0s0n newcode profile profile1 Which of the following is true? (Select the best answer.)
2.
Which of the following is least likely to be a function of a Cisco ESA? (Select the best answer.)
3.
You upload a file named isitbad.zip to AMP for analysis. While reviewing the AMP logs, you receive the following output:
Wed Feb 17 12:41:05 2015 Info: File reputation query initiating. File Name =
'isitbad.zip', MID = 852, File Size = 174401 bytes, File Type = application/zipWed
Feb 17 12:41:10 2015 Info: Response received for file reputation query from Cloud.
File Name = 'isitbad.zip', MID = 852, Disposition = unscannable,
Malware = None, Reputation Score = 0, sha256 =
78d80f8fb0e6eaa2988d11607ec6a00840147f8188f6db8b7d00d907440d7aaa, upload_action = 1
Which of the following is true? (Select the best answer.)
4.
You are troubleshooting IPSec VPN connectivity between two sites. From the local router, you are able to ping the remote tunnel endpoint. Which of the following steps should you perform next? (Select the best answer.)
5.
You have configured a Cisco ESA with a URL Category action that redirects the URLs of adult content sites to the Cisco Cloud Web Security proxy service. You receive a report that users are successfully accessing some adult content sites from the company network. However, you are able to verify that known adult sites are being redirected. Which of the following could be the problem? (Select the best answer.)
6.
An inbound TCP packet arrives at the ingress interface of a Cisco ASA 8.2 firewall. The packet is part of an established session. The packet reaches the interface's internal buffer and the input counter is incremented. Which of the following actions will occur next? (Select the best answer.)
7.
Which of the following is not an attribute on which an ISE MDM policy can be based? (Select the best answer.)
8.
Which of the following features are supported on a Cisco ASA operating in multiple context mode? (Select 2 choices.)
9.
Refer to the following partial sample output from the show crypto ipsec sa command:
PFS (Y/N): N, DH group: none
0x82E64150(2196128080)
FastEthernet0/0 current outbound spi:
10.20.20.2 path mtu 1500, ip mtu 1500, ip mtu idb
local crypto endpt.: 10.10.10.2, remote crypto endpt.:
#send errors 0, #recv errors 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts decaps: 2, #pkts decrypt: 2, #pkts verify: 2
#pkts encaps: 2, #pkts encrypt: 2, #pkts digest: 2
PERMIT, flags={origin_is_acl,}
current_peer 10.20.20.2 port 500
(addr/mask/prot/port): (172.16.17.0/255.255.255.0/0/0)
(192.168.1.0/255.255.255.0/0/0) remote ident
local ident (addr/mask/prot/port):
protected vrf: (none)
Crypto map tag: aesmap, local addr 10.10.10.2
interface: FastEthernet0/0
Which of the following statements is true? (Select the best answer.)
10.
Which of the following statements is true regarding a HIDS? (Select the best answer.)