1.
You are configuring manual NAT on a Cisco Firepower device. Which of the following best describes the order in which the NAT rules will be processed? (Select the best answer.)
2.
Which of the following is least likely to be considered a form of malware? (Select the best answer.)
3.
Which of the following occurs when an IDS or IPS does not identify malicious traffic that enters the network? (Select the best answer.)
4.
Which of the following lost or stolen device options are available to employees when MDM is integrated with ISE? (Select 3 choices.)
5.
Which of the following private VLAN port types communicate only with promiscuous ports? (Select the best answer.)
6.
On which of the following layers of the hierarchical network design model should you implement PortFast, BPDU guard, and root guard? (Select the best answer.)
7.
Which of the following is the man-in-the-middle attack that is most likely to be used to cause a workstation to send traffic to a false gateway IP address? (Select the best answer.)
8.
On a Cisco ASA, which of the following RADIUS authentication protocols are not supported? (Select 2 choices.)
9.
Which of the following is the best reason to enforce blacklisting by security zone on a Cisco device that uses the Security Intelligence IP Address Reputation feature? (Select the best answer.)
10.
Which of the following is not true of SIM systems? (Select the best answer.)