1.
You have issued the following commands to modify the 802.1X configuration on a switch port:
switch(configif)#authentication order mab dot1x
switch(configif)#authentication priority dot1x mab
switch(configif)#authentication event fail action nextmethod
switch(configif)#authentication event noresponse action authorize
vlan 1313
A new host is attached to the switch port. The host's MAC address is in the authentication database, but the host's certificate for 802.1X authentication is expired. Which of the following statements is true regarding the host in this scenario? (Select the best answer.)
2.
Which of the following are symmetric encryption algorithms? (Select 3 choices.)
3.
Which of the following statements is correct regarding the traffic types that can be matched in a class map on a Cisco ASA? (Select the best answer.)
4.
Which of the following EAP authentication protocols requires both a client and a server digital certificate? (Select the best answer.)
5.
The system software on a Cisco Catalyst 3750 series switch was corrupted during a failed upgrade, and now the switch no longer passes the POST on restart. You want to use the Xmodem Protocol to recover the system software. To which of the following ports on the switch could you connect? (Select the best answer.)
6.
Which of the following security functions is associated with the control plane? (Select the best answer.)
7.
Which of the following statements are true regarding IDS devices? (Select 2 choices.)
8.
Which of the following statements are true regarding TACACS+? (Select 2 choices.)
9.
Which of the following protocols can IPSec use to provide the integrity component of the CIA triad? (Select 2 choices.)
10.
RouterA is configured to establish an IKE tunnel with RouterB. You issue the show crypto isakmp sa command on RouterA and receive the following output:
dst src state connid slot
10.1.2.3 10.1.2.4 MM_SA_SETUP 1 0
Which of the following statements is true? (Select the best answer.)