1.
An inside host has initiated a TCP connection through a Cisco ASA to an outside server. The outside server has responded with a SYN/ACK segment? however, the inside host has not yet responded with an ACK segment. Which of the following lines of output from the show conn command best represents the state of the connection in this scenario? (Select the best answer.)
2.
Which of the following is an IOS privilege level that provides the highest level of access on a Cisco router? (Select the best answer.)
3.
Which of the following statements is true regarding LDAP attribute maps on an ASA? (Select the best answer.)
4.
Which of the following can be determined from the Route Details tab of the VPN Client Statistics dialog box shown above? (Select the best answer.)
5.
Which of the following IPS detection methods is a string pattern-based detection method? (Select the best answer.)
6.
You have been asked to add a key to an existing keychain. You issue the following commands to enter key chain key configuration mode:
RouterA(config)#key chain chain1
RouterA(configkeychain)#key 2
RouterA(configkeychainkey)#keystring key2
The new key should be valid for three hours, and the router should begin sending the key at 9 a.m. on January 13, 2015. Which of the following commands should you issue next to achieve your goal? (Select the best answer.)
7.
Which of the following can be mitigated by installing a personal firewall on a laptop? (Select the best answer.)
8.
When a switch is configured with private VLANs, which of the following ports can an isolated port communicate with? (Select the best answer.)
9.
Which of the following statements is not true regarding the IaaS service model? (Select the best answer.)
10.
Which of the following emailrelated FirePOWER preprocessors can extract and decode attachments in clienttoserver traffic? (Select the best answer.)