Q101. Enabling what security mechanism can prevent an attacker from gaining network topology information from CDP? 

A. MACsec 

B. Flex VPN 

C. Control Plane Protection 

D. Dynamic Arp Inspection 

Answer:


Q102. To which port does a firewall send secure logging messages? 

A. TCP/1500 

B. UDP/1500 

C. TCP/500 

D. UDP/500 

Answer:


Q103. Which two options are two purposes of the packet-tracer command? (Choose two.) 

A. to filter and monitor ingress traffic to a switch 

B. to configure an interface-specific packet trace 

C. to inject virtual packets into the data path 

D. to debug packet drops in a production network 

E. to correct dropped packets in a production network 

Answer: C,D 


Q104. All 30 users on a single floor of a building are complaining about network slowness. After investigating the access switch, the network administrator notices that the MAC address table is full (10,000 entries) and all traffic is being flooded out of every port. Which action can the administrator take to prevent this from occurring? 

A. Configure port-security to limit the number of mac-addresses allowed on each port 

B. Upgrade the switch to one that can handle 20,000 entries 

C. Configure private-vlans to prevent hosts from communicating with one another 

D. Enable storm-control to limit the traffic rate 

E. Configure a VACL to block all IP traffic except traffic to and from that subnet 

Answer:


Q105. Which statement about the configuration of Cisco ASA NetFlow v9 (NSEL) is true? 

A. Use a sysopt command to enable NSEL on a specific interface. 

B. To view bandwidth usage for NetFlow records, you must have QoS feature enabled 

C. NSEL tracks the flow continuously and provides updates every 10 seconds. 

D. You must define a flow-export event type under a policy. 

E. NSEL can be used without a collector configured. 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_co nfig/ monitor_nsel.html 


Q106. A switch is being configured at a new location that uses statically assigned IP addresses. Which will ensure that ARP inspection works as expected? 

A. Configure the 'no-dhcp' keyword at the end of the ip arp inspection command 

B. Enable static arp inspection using the command 'ip arp inspection static vlan vlan-number 

C. Configure an arp access-list and apply it to the ip arp inspection command 

D. Enable port security 

Answer:


Q107. Which option describes the purpose of the input parameter when you use the packet-tracer command on a Cisco device? 

A. to provide detailed packet-trace information 

B. to specify the source interface for the packet trace 

C. to display the trace capture in XML format 

D. to specify the protocol type for the packet trace 

Answer:


Q108. Which three logging methods are supported by Cisco routers? (Choose three.) 

A. console logging 

B. TACACS+ logging 

C. terminal logging 

D. syslog logging 

E. ACL logging 

F. RADIUS logging 

Answer: A,C,D 


Q109. Your company is replacing a high-availability pair of Cisco ASA 5550 firewalls with the newer Cisco ASA 5555-X models. Due to budget constraints, one Cisco ASA 5550 will be replaced at a time. 

Which statement about the minimum requirements to set up stateful failover between these two firewalls is true? 

A. You must install the USB failover cable between the two Cisco ASAs and provide a 1 Gigabit Ethernet interface for state exchange. 

B. It is not possible to use failover between different Cisco ASA models. 

C. You must have at least 1 Gigabit Ethernet interface between the two Cisco ASAs for state exchange. 

D. You must use two dedicated interfaces. One link is dedicated to state exchange and the other link is for heartbeats. 

Answer:


Q110. How many bridge groups are supported on a firewall that operate in transparent mode? 

A. 8 

B. 16 

C. 10 

D. 6 

Answer: