[Free] 2018(Mar) EnsurePass Testinsides Cisco 300-206 Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar Cisco Official New Released 300-206
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Edge Network Security Solutions

Question No: 91

Which policy map action makes a Cisco router behave as a stateful firewall for matching traffic?

  1. Log

  2. Inspect

  3. Permit

  4. Deny

Answer: B

Question No: 92

An attacker has gained physical access to a password protected router. Which command will prevent access to the startup-config in NVRAM?

  1. no service password-recovery

  2. no service startup-config

  3. service password-encryption

  4. no confreg 0x2142

Answer: A

Question No: 93

When you set a Cisco IOS Router as an SSH server, which command specifies the RSA public key of the remote peer when you set the SSH server to perform RSA-based authentication?

  1. router(config-ssh-pubkey-user)#key

  2. router(conf-ssh-pubkey-user)#key-string

  3. router(config-ssh-pubkey)#key-string

  4. router(conf-ssh-pubkey-user)#key-string enable ssh

Answer: B

Question No: 94

When troubleshooting redundant interface operations on the Cisco ASA, which configuration should be verified?

  1. The nameif configuration on the member physical interfaces are identical.

  2. The MAC address configuration on the member physical interfaces are identical.

  3. The active interface is sending periodic hellos to the standby interface.

  4. The IP address configuration on the logical redundant interface is correct.

  5. The duplex and speed configuration on the logical redundant interface are correct.

Answer: D

Question No: 95

What is the default log level on the Cisco Web Security Appliance?

  1. Trace

  2. Debug

  3. Informational

  4. Critical

Answer: C

Question No: 96

When you configure a Botnet Traffic Filter on a Cisco firewall, what are two optional tasks? (Choose two.)

  1. Enable the use of dynamic databases.

  2. Add static entries to the database.

  3. Enable DNS snooping.

  4. Enable traffic classification and actions.

  5. Block traffic manually based on its syslog information.

Answer: B,E

Question No: 97

In IOS routers, what configuration can ensure both prevention of ntp spoofing and accurate time ensured?

  1. ACL permitting udp 123 from ntp server

  2. ntp authentication

  3. multiple ntp servers

  4. local system clock

Answer: B

Question No: 98

Which cloud characteristic is used to describes the sharing of physical resource between various entities ?

  1. Elasticity

  2. Ubiquitous access

  3. Multitenancy

  4. Resiliency

Answer: C

Question No: 99

All 30 users on a single floor of a building are complaining about network slowness. After investigating the access switch, the network administrator notices that the MAC address table is full (10,000 entries) and all traffic is being flooded out of every port. Which action can the administrator take to prevent this from occurring?

  1. Configure port-security to limit the number of mac-addresses allowed on each port

  2. Upgrade the switch to one that can handle 20,000 entries

  3. Configure private-vlans to prevent hosts from communicating with one another

  4. Enable storm-control to limit the traffic rate

  5. Configure a VACL to block all IP traffic except traffic to and from that subnet

Answer: A

Question No: 100

Which Cisco ASA show command groups the xlates and connections information together in its output?

  1. show conn

  2. show conn detail

  3. show xlate

  4. show asp

  5. show local-host

Answer: E

100% Ensurepass Free Download!
Download Free Demo:300-206 Demo PDF
100% Ensurepass Free Guaranteed!
300-206 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com