123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

300-207 Certifications Book

Profile Picture
By Author: mcleod.k
Total Articles: 155
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Question: 1

Which three commands can be used to harden a switch? (Choose three.)

A. switch(config-if)# spanning-tree bpdufilter enable
B. switch(config)# ip dhcp snooping
C. switch(config)# errdisable recovery interval 900
D. switch(config-if)# spanning-tree guard root
E. switch(config-if)# spanning-tree bpduguard disable
F. switch(config-if)# no cdp enable

Answer: BDF

Question: 2

What are three features of the Cisco ASA 1000V? (Choose three.)

A. cloning the Cisco ASA 1000V
B. dynamic routing
C. the Cisco VNMC policy agent
D. IPv6
E. active/standby failover
F. QoS

Answer: ACE

Question: 3

If the Cisco ASA 1000V has too few licenses, what is its behavior?

A. It drops all traffic.
B. It drops all outside-to-inside packets.
C. It drops all inside-to-outside packets.
D. It passes the first outside-to-inside packet and drops all remaining packets.

Answer: D

Question: 4

A network administrator is creating an ASA-CX administrative ...
... user account with the following parameters:
- The user will be responsible for configuring security policies on networkdevices.
- The user needs read-write access to policies.
- The account has no more rights than necessary for the job.
What role will the administrator assign to the user?

A. Administrator
B. Security administrator
C. System administrator
D. Root Administrator
E. Exec administrator

Answer: B

Question: 5

Which two web browsers are supported for the Cisco ISE GUI? (Choose two.)

A. HTTPS-enabled Mozilla Firefox version 3.x
B. Netscape Navigator version 9
C. Microsoft Internet Explorer version 8 in Internet Explorer 8-only mode
D. Microsoft Internet Explorer version 8 in all Internet Explorer modes
E. Google Chrome (all versions)

Answer: AC

Question: 6

With Cisco ASA active/standby failover, by default, how many monitored interface failures will cause failover to occur?

A. 1
B. 2
C. 3
D. 4
E. 5

Answer: A

Question: 7

Which statement about SNMP support on the Cisco ASA appliance is true?

A. The Cisco ASA appliance supports only SNMPv1 or SNMPv2c.
B. The Cisco ASA appliance supports read-only and read-write access.
C. The Cisco ASA appliance supports three built-in SNMPv3 groups in Cisco ASDM:
Authentication and Encryption, Authentication Only, and No Authentication, No Encryption.
D. The Cisco ASA appliance can send SNMP traps to the network management station only using SNMPv2.

Answer: C

Question: 8

Which statement about Cisco ASA multicast routing support is true?

A. The Cisco ASA appliance supports PIM dense mode, sparse mode, and BIDIR-PIM.
B. The Cisco ASA appliance supports only stub multicast routing by forwarding IGMP messages from multicastreceivers to the upstream multicast router.
C. The Cisco ASA appliance supports DVMRP and PIM.
D. The Cisco ASA appliance supports either stub multicast routing or PIM, but both cannot be enabled at thesame time.
E. The Cisco ASA appliance supports only IGMP v1.

Answer: D

Question: 9

How many interfaces can a Cisco ASA bridge group support and how many bridge groups can a Cisco ASA appliance support?

A. up to 2 interfaces per bridge group and up to 4 bridge groups per Cisco ASA appliance
B. up to 2 interfaces per bridge group and up to 8 bridge groups per Cisco ASA appliance
C. up to 4 interfaces per bridge group and up to 4 bridge groups per Cisco ASA appliance
D. up to 4 interfaces per bridge group and up to 8 bridge groups per Cisco ASA appliance
E. up to 8 interfaces per bridge group and up to 4 bridge groups per Cisco ASA appliance
F. up to 8 interfaces per bridge group and up to 8 bridge groups per Cisco ASA appliance

Answer: D

Question: 10

Which addresses are considered "ambiguous addresses" and are put on the greylist by the Cisco ASA botnet traffic filter feature?

A. addresses that are unknown
B. addresses that are on the greylist identified by the dynamic database
C. addresses that are blacklisted by the dynamic database but also are identified by the static whitelist
D. addresses that are associated with multiple domain names, but not all of these domain names are on the blacklist

Answer: D

Question: 11

For which purpose is the Cisco ASA CLI command aaa authentication match used?

A. Enable authentication for SSH and Telnet connections to the Cisco ASA appliance.
B. Enable authentication for console connections to the Cisco ASA appliance.
C. Enable authentication for connections through the Cisco ASA appliance.
D. Enable authentication for IPsec VPN connections to the Cisco ASA appliance.
E. Enable authentication for SSL VPN connections to the Cisco ASA appliance.
F. Enable authentication for Cisco ASDM connections to the Cisco ASA appliance.

Answer: C

Question: 12

A network engineer is asked to configure NetFlow to sample one of every 100 packets on a router's fa0/0 interface. Which configuration enables sampling, assuming that NetFlow is already configured and running on the router's fa0/0 interface?

A. flow-sampler-map flow1mode random one-out-of 100
interface fas0/0 flow-sampler flow1
B. flow monitor flow1mode random one-out-of 100
interface fas0/0 ip flow monitor flow1
C. flow-sampler-map flow1one-out-of 100 interface fas0/0 flow-sampler flow1
D. ip flow-export source fas0/0 one-out-of 100

Answer: A

Question: 13

What is the default log level on the Cisco Web Security Appliance?

A. Trace
B. Debug
C. Informational
D. Critical

Answer: C

Question: 14

Which command sets the source IP address of the NetFlow exports of a device?

A. ip source flow-export
B. ip source netflow-export
C. ip flow-export source
D. ip netflow-export source

Answer: C

Question: 15

Which two SNMPv3 features ensure that SNMP packets have been sent securely?" Choose two.

A. host authorization
B. authentication
C. encryption
D. compression

Answer: BC

Question: 16

Which three logging methods are supported by Cisco routers? (Choose three.)

A. console logging
B. TACACS+ logging
C. terminal logging
D. syslog logging
E. ACL logging
F. RADIUS logging

Answer: ACD

Question: 17

Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)

A. NTP authentication is enabled.
B. NTP authentication is disabled.
C. NTP logging is enabled.
D. NTP logging is disabled.
E. NTP access is enabled.
F. NTP access is disabled.

Answer: BDE

Question: 18

A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?

A. When the Cisco Unified Communications Manager cluster is in non-secure mode
B. When the Cisco Unified Communications Manager cluster is in secure mode only
C. When the Cisco Unified Communications Manager is not part of a cluster
D. When the Cisco ASA is configured for IPSec VPN

Answer: A

Question: 19

Which two features are supported when configuring clustering of multiple Cisco ASA appliances? (Choose two.)

A. NAT
B. dynamic routing
C. SSL remote access VPN
D. IPSec remote access VPN

Answer: AB

Question: 20

Which two device types can Cisco Prime Security Manager manage in Multiple Device mode? (Choose two.)

A. Cisco ESA
B. Cisco ASA
C. Cisco WSA
D. Cisco ASA CX

Answer: BD

Total Views: 410Word Count: 1095See All articles From Author

Add Comment

Education Articles

1. Study Ms In Uk For Indian Students For 2024-25 Intake
Author: Transglobal Overseas

2. Top Land Survey And Transportation Design Courses To Boost Your Career
Author: Alaikha

3. Charting Your Course To Cbap Certification: A Comprehensive Guide
Author: Myank

4. Jaipur's Finest: Ranking The Best Nda Coaching Institutes For 2024
Author: Richard

5. Azure Devops Online Training In Hyderabad | Azure Devops Course Online
Author: Renuka

6. Arena Animation Tilak Road - Pune's Premier Animation Institute
Author: Arena Animation Tilak Road

7. Project Management Software
Author: Sangita Samal

8. Lunch Box
Author: nehashah

9. Docker Online Training | Docker And Kubernetes Training
Author: Teja

10. Working With Files In Python: A Comprehensive Guide
Author: Ferilion labs

11. Fostering Creativity In Children's Education: Approaches And Benefits
Author: hussanisoyat

12. Harness The Power Of Machine Learning: Research Proposal Development In Abuja, Nigeria
Author: elaine

13. Empowering Learners: The Evolution Of Education In Dubai's Schools
Author: faizalkhan1393

14. The Importance Of Early Preparation: Securing Admission To Your Dream School
Author: anwarkhan45314

15. Unleash The Power Of Digital Marketing For Your Small Business
Author: Unleash the Power of Digital Marketing for Your Sm

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: