aiotestking uk

300-206 Exam Questions - Online Test


300-206 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices? 

A. Prime Infrastructure 

B. Prime Assurance 

C. Prime Network Registrar 

D. Prime Network Analysis Module 

Answer:

Q2. Which two options are protocols and tools that are used by the management plane when discussing Cisco ASA general management plane hardening? ( Choose two ) 

A. Unicast Reverse Path Forwarding 

B. NetFlow 

C. Routing Protocol Authentication 

D. Threat detection 

E. Syslog 

F. ICMP unreachables 

G. Cisco URL Filtering 

Answer: B,E 

Explanation: http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html 

Q3. Which three statements about transparent firewall are true? ( Choose three) 

A. It does not support any type of VPN. 

B. Both interfaces must be configured with private IP addresses. 

C. It can have only a management IP address. 

D. It does not support dynamic routing protocols. 

E. It only supports PAT. 

F. Transparent firewall works at Layer 2. 

Answer: C,D,F 

Q4. Which three logging methods are supported by Cisco routers? (Choose three.) 

A. console logging 

B. TACACS+ logging 

C. terminal logging 

D. syslog logging 

E. ACL logging 

F. RADIUS logging 

Answer: A,C,D 

Q5. What is the default behavior of an access list on the Cisco ASA security appliance? 

A. It will permit or deny traffic based on the access-list criteria. 

B. It will permit or deny all traffic on a specified interface. 

C. An access group must be configured before the access list will take effect for traffic control. 

D. It will allow all traffic. 

Answer:

Q6. Which option lists cloud deployment models? 

A. Private, public, hybrid, shared 

B. Private, public, hybrid 

C. IaaS, PaaS, SaaS 

D. Private, public, hybrid, community 

Answer:

Explanation: https://www.ibm.com/developerworks/community/blogs/722f6200-f4ca-4eb3-9d64-8d2b58b2d4e8/entry/4_Types_of_Cloud_Computing_Deployment_Model_You_Need_to_K now1 ?lang=en 

Q7. Which information is NOT replicated to the secondary Cisco ASA adaptive security appliance in an active/standby configuration with stateful failover links ? 

A. TCP sessions 

B. DHCP lease 

C. NAT translations 

D. Routing tables 

Answer:

Q8. Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall? 

A. packet tracer 

B. ping 

C. traceroute 

D. SNMP walk 

Answer:

Q9. What are three of the RBAC views within Cisco IOS Software? (Choose three.) 

A. Admin 

B. CLI 

C. Root 

D. Super Admin 

E. Guest 

F. Super 

Answer: B,C,F 

Q10. Which two configurations are necessary to enable password-less SSH login to an IOS router? (Choose two.) 

A. Enter a copy of the administrator's public key within the SSH key-chain 

B. Enter a copy of the administrator's private key within the SSH key-chain 

C. Generate a 512-bit RSA key to enable SSH on the router 

D. Generate an RSA key of at least 768 bits to enable SSH on the router 

E. Generate a 512-bit ECDSA key to enable SSH on the router 

F. Generate a ECDSA key of at least 768 bits to enable SSH on the router 

Answer: A,D