1.
Which of the following best describes a MAC spoofing attack? (Select the best answer.)
2.
You issue the show zone security command on a Cisco router and receive the following command output:
RouterA#show zone security
zone self
Description: System defined zone
zone inside
Member Interfaces:
FastEthernet0/0
FastEthernet0/1
zone outside
Member Interfaces:
Serial0/0/0
zone dmz
Member Interfaces:
Serial0/0/1
Based on the command output, to which zones can the S0/1/0 interface send traffic? (Select the best answer.)
3.
Which of the following features can cause a switch port to enter the errdisable state? (Select the best answer.)
4.
Which of the following are not considered NGE cryptographic algorithms and should be avoided according to Cisco? (Select 2 choices.)
5.
You want to configure a router so that networkbased CLI access is limited to SSH connections that are received on a specified interface. Which of the following Cisco IOS features should you configure to achieve your goal? (Select the best answer.)
6.
Which of the following describes a TPM? (Select the best answer.)
7.
Which of the following are not default values in an IKE policy on an ASA running software version 8.4 or higher? (Select 2 choices.)
8.
Which of the following is specifically filtered by a URL filtering subscription service on a Cisco router? (Select the best answer.)
9.
Which of the following actions could you take to mitigate VLAN hopping attacks? (Select the best answer.)
10.
Which of the following devices typically sits inline? (Select the best answer.)