Q1. Which two statements about role-based access control are true?(Choose two)
A. Server profile administrators have read and write access to all system logs by default.
B. If the same user name is used for a local user account and a remote user account, the roles defined in the remote user account override the local user account.
C. A view is created on the Cisco IOS device to leverage role-based access controls.
D. Network administrators have read and write access to all system logs by default.
E. The user profile on an AAA server is configured with the roles that grant user privileges.
Answer: D,E
Q2. DRAG DROP
Drag each ISE probe on the left to the matching statement on the right.
Answer:
Q3. Refer to the exhibit
Which as-path access-list regular expression should be applied on R2 as a neighbor filter list to only allow update with and origin of AS 65503?
A. _65509.?$
B. _65503$
C. ^65503.*
D. ^65503$
E. _65503_
F. 65503
Answer: C
Q4. Which two statements about the ISO are true? (Choose two)
A. The ISO is a government-based organization.
B. The ISO has three membership categories: member, correspondent, and subscribers.
C. Only member bodies have voting rights.
D. Correspondent bodies are small countries with their own standards organization.
E. Subscriber members are individual organizations.
Answer: B,C
Q5. Refer to the exhibit. What is the effect of the given configuration?
A. It sets the duplicate address detection interval to 60 second and sets the IPv6 neighbor reachable time to 3600 milliseconds.
B. It sets the number of neighbor solicitation massages to 60 and sets the retransmission interval to
3600 milliseconds.
C. It sets the number of duplicate address detection attempts to 60 and sets the duplicate address detection interval to 3600 millisecond.
D. It sets the number of neighbor solicitation massage to 60 and set the duplicate address detection interval to 3600 second.
E. It sets the duplicate address detection interval to 60 second and set the IPv6 neighbor solicitation interval to 3600 millisecond.
Answer: E
Q6. DRAG DROP
Drag and drop the description on the left on to the associated item on the right.
Answer:
Explanation: Collection of similar programs that work together to execute specific tasks: Botnet
Independent malicious program copies itself: Worms
Programs that appear to have one function but actually performs a different function: Trojan horse
Programs that modify other programs: Virus
Q7. Which category to protocol mapping for NBAR is correct?
A. Category:internet Protocol:FTP,HTTP,TFTP
B. )Category:Network management Protocol:ICMP,SNMP,SSH,telent
C. Category:network mail services Protocol:mapi,pop3,smtp
D. Category:Enterprise applications Protocal:citrixICA,PCAnywhere,SAP,IMAP
Answer: A
Q8. Which two statement about Infrastructure ACLs on Cisco IOS software are true? (Choose two.)
A. Infrastructure ACLs are used to block-permit the traffic in the router forwarding path.
B. Infrastructure ACLs are used to block-permit the traffic handled by the route processor.
C. Infrastructure ACLs are used to block-permit the transit traffic.
D. Infrastructure ACLs only protect device physical management interface.
Answer: B,D
Q9. You have discovered unwanted device with MAC address 001c.0f12.badd on port FastEthernet1/1 on
VLAN 4.what command or command sequence can you enter on the switch to prevent the
MAC address from passing traffic on VLAN 4?
A)
B)
C)
D)
E)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Q10. In which class of applications security threads does HTTP header manipulation reside?
A. Session management
B. Parameter manipulation
C. Software tampering
D. Exception managements
Answer: A