aiotestking uk

300-206 Exam Questions - Online Test


300-206 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Refer to the exhibit. 

Server A is a busy server that offers these services: 

. World Wide Web 

. DNS 

Which command captures http traffic from Host A to Server A? 

A. capture traffic match udp host 10.1.1.150 host 10.2.2.100 

B. capture traffic match 80 host 10.1.1.150 host 10.2.2.100 

C. capture traffic match ip 10.2.2.0 255.255.255.192 host 10.1.1.150 

D. capture traffic match tcp host 10.1.1.150 host 10.2.2.100 

E. capture traffic match tcp host 10.2.2.100 host 10.1.1.150 eq 80 

Answer:

Q2. Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall? 

A. packet tracer 

B. ping 

C. traceroute 

D. SNMP walk 

Answer:

Q3. Which.URL downloads a copy of packet-capture named "security" residing on a Cisco ASA adaptive security appliance with IP 10.10.100.11? 

A. https://10.10.100.11/capture/security/pcap 

B. https://10.10.100.11/capture/security.pcap 

C. https://10.10.100.11/security.pcap/download 

D. https://10.10.100.11/asa/security/pcap 

Answer:

Q4. Enabling what security mechanism can prevent an attacker from gaining network topology information from CDP? 

A. MACsec 

B. Flex VPN 

C. Control Plane Protection 

D. Dynamic Arp Inspection 

Answer:

Q5. Refer to the exhibit. 

Which two statements about this firewall output are true? (Choose two.) 

A. The output is from a packet tracer debug. 

B. All packets are allowed to 192.168.1.0 255.255.0.0. 

C. All packets are allowed to 192.168.1.0 255.255.255.0. 

D. All packets are denied. 

E. The output is from a debug all command. 

Answer: A,C 

Q6. What are two high-level task areas in a Cisco Prime Infrastructure life-cycle workflow? (Choose two.) 

A. Design 

B. Operate 

C. Maintain 

D. Log 

E. Evaluate 

Answer: A,B 

Q7. To which interface on a Cisco ASA 1000V firewall should a security profile be applied when a VM sits behind it? 

A. outside 

B. inside 

C. management 

D. DMZ 

Answer:

Q8. When a Cisco ASA is configured in multicontext mode, which command is used to change between contexts? 

A. changeto config context 

B. changeto context 

C. changeto/config context change 

D. changeto/config context 2 

Answer:

Q9. What is the default violation mode that is applied by port security? 

A. restrict 

B. protect 

C. shutdown 

D. shutdown VLAN 

Answer:

Q10. Which statement about traffic storm control behavior is true? 

A. Traffic storm control cannot determine if the packet is unicast or broadcast. 

B. If you enable broadcast and multicast traffic storm control and the combined broadcast and multicast traffic exceeds the level within a 1 second traffic storm interval, storm control drops all broadcast and multicast traffic until the end of the storm interval 

C. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast. 

D. Traffic storm control monitors incoming traffic levels over a 10 second traffic storm control interval 

Answer: