[Free] 2017(Apr) Ensurepass Testking Cisco 300-206 Latest Dumps 21-30

Ensurepass
2017 April Cisco Official New Released 300-206 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/300-206.html

Implementing Cisco Edge Network Security Solutions

QUESTION 21

Which option describes the purpose of the input parameter when you use the packet-tracer command on a Cisco device?

 

A.

to provide detailed packet-trace information

B.

to specify the source interface for the packet trace

C.

to display the trace capture in XML format

D.

to specify the protocol type for the packet trace

 

Correct Answer: B

 

 

QUESTION 22

You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations.

 

The CSO has tasked you with enable Botnet traffic filter on the Cisco ASA to detect and deny further connection attempts from infected PCs to malware destinations. You are also required to test your configurations by initiating connections through the Cisco ASA and then display and observe the Real-Time Log Viewer in ASDM.

 

To successfully complete this activity, you must perform the following tasks:

 

* Download the dynamic database and enable use of it.

 

clip_image002Enable the ASA to download of the dynamic database

clip_image002[1]Enable the ASA to download of the dynamic database.

clip_image002[2]Enable DNS snooping for existing DNS inspection service policy rules.

clip_image002[3]Enable Botnet Traffic Filter classification on the outside interface for All Traffic.

clip_image002[4]Configure the Botnet Traffic Filter to drop blacklisted traffic on the outside interface. Use the default Threat Level settings

 

NOTE: The database files are stored in running memory; they are not stored in flash memory.

NOTE: DNS is enabled on the inside interface and set to the HQ-SRV (10.10.3.20).

NOTE: Not all ASDM screens are active for this exercise.

 

Verify that the ASA indeed drops traffic to blacklisted destinations by doing the following:

 

clip_image002[5]From the Employee PC, navigate to http://www.google.com to make sure that access to the Internet is working.

clip_image002[6]From the Employee PC, navigate to http://bot-sparta.no-ip.org. This destination is classified as malware destination by the Cisco SIO database.

clip_image002[7]From the Employee PC, navigate to http://superzarabotok-gid.ru/. This destination is classified as malware destination by the Cisco SIO database.

clip_image002[8]From Admin PC, launch ASDM to display and observe the Real-Time Log Viewer.

 

You have completed this exercise when you have configured and successfully tested Botnet traffic filter on the Cisco ASA.

 

clip_image004

clip_image006

clip_image008

 

Explanation:

First, click on both boxes on the Botnet Database as shown below and hit apply:

 

clip_image010

 

Click Yes to send the commands when prompted.

 

Then, click on the box on the DNS Snooping page as shown below and hit apply:

 

clip_image012

 

Click Yes to send the commands when prompted.

 

Then, click on the box on th
e Traffic Settings tab as shown:

 

clip_image014

 

At which point this pop-up box will appear when you click on the Add button:

 

clip_image016

 

Click OK. Then Apply. Then Send when prompted.

 

Then verify that all is working according to the instructions given in the question.

 

 

QUESTION 23

Which two TCP ports must be open on the Cisco Security Manager server to allow the server to communicate with the Cisco Security Manager client? (Choose two.)

 

A.

1741

B.

443

C.

80

D.

1740

E.

8080

 

Correct Answer: AB

 

 

 

 

 

 

 

QUESTION 24

The Cisco Email Security Appliance can be managed with both local and external users of different privilege levels. What three external modes of authentication are supported? (Choose three.)

 

A.

LDAP authentication

B.

RADIUS Authentication

C.

TACAS

D.

SSH host keys

E.

Common Access Card Authentication

F.

RSA Single use tokens

 

Correct Answer: ABD

 

 

QUESTION 25

clip_image018

clip_image020

clip_image022

clip_image024

Which statement is true of the logging configuration on the Cisco ASA?

 

A.

The contents of the internal buffer will be saved to an FTP server before the buffer is overwritten.

B.

The contents of the internal buffer will be saved to flash memory before the buffer is overwritten.

C.

System log messages with a severity level of six and higher will be logged to the internal buffer.

D.

System log messages with a severity level of six and lower will be logged to the internal buffer.

 

Correct Answer: C

Explanation:

clip_image026

clip_image028

 

QUESTION 26

Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall?

 

A.

packet tracer

B.

ping

C.

traceroute

D.

SNMP walk

 

Correct Answer: A

 

 

QUESTION 27

Which command sets the source IP address of the NetFlow exports of a device?

 

A.

ip source flow-export

B.

ip source netflow-export

C.

ip flow-export source

D.

ip netflow-export source

 

Correct Answer: C

 

 

QUESTION 28

What is the default log level on the Cisco Web Security Appliance?

 

A.

Trace

B.

Debug

C.

Informational

D.

Critical

 

Correct Answer: C

 

 

QUESTION 29

Which statement about Cisco Security Manager form factors is true?

 

A.

Cisco Security Manager Professional and Cisco Security Manager UCS Server Bundles support FWSMs.

B.

Cisco Security Manager Standard and Cisco Security Manager Professional support FWSMs.

C.

Only Cisco Security Manager Professional supports FWSMs.

D.

Only Cisco Security Manager Standard supports FWSMs.

 

Correct Answer: A

 

 

QUESTION 30

Which ASA feature is used to keep track of suspected attackers who create connections to too many hosts or ports?

 

A.

complex threat detection

B.

scanning threat detection

C.

basic threat detection

D.

advanced threat detection

 

Correct Answer: B

100% Free Download!
—Download Free Demo:300-206 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 300-206 Full Exam PDF and VCE Q&As:222
—Get 10% off your purchase! Copy it:8GTC-8UIE-M1SC [2017.04.01-2017.04.30]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE

HOT EXAM!
Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com