300-206 Premium Bundle

300-206 Premium Bundle

Implementing Cisco Edge Network Security Solutions Certification Exam

4.5 
(18405 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-206 Free Practice Questions

Q1. Which Layer 2 security feature prevents traffic on a LAN from being disrupted by a broadcast,multicat, or unicast storm on one physical interface? 

A. Bridge protocol Data Unit Guard 

B. Storm Control 

C. Embedded event monitoring 

D. Access control lists 

Answer:

Q2. Which two options are private-VLAN secondary VLAN types? (Choose two) 

A. Isolated 

B. Secured 

C. Community 

D. Common 

E. Segregated 

Answer: A,C 

Explanation: 

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/configuration/guid e/cli/ CLIConfigurationGuide/PrivateVLANs.html 

Q3. Your company is replacing a high-availability pair of Cisco ASA 5550 firewalls with the newer Cisco ASA 5555-X models. Due to budget constraints, one Cisco ASA 5550 will be replaced at a time. 

Which statement about the minimum requirements to set up stateful failover between these two firewalls is true? 

A. You must install the USB failover cable between the two Cisco ASAs and provide a 1 Gigabit Ethernet interface for state exchange. 

B. It is not possible to use failover between different Cisco ASA models. 

C. You must have at least 1 Gigabit Ethernet interface between the two Cisco ASAs for state exchange. 

D. You must use two dedicated interfaces. One link is dedicated to state exchange and the other link is for heartbeats. 

Answer:

Q4. What is the default behavior of an access list on the Cisco ASA security appliance? 

A. It will permit or deny traffic based on the access-list criteria. 

B. It will permit or deny all traffic on a specified interface. 

C. An access group must be configured before the access list will take effect for traffic control. 

D. It will allow all traffic. 

Answer:

Q5. SNMP users have a specified username, a group to which the user belongs, authentication password, encryption password, and authentication and encryption algorithms to use. The authentication algorithm options are MD5 and SHA. The encryption algorithm options are DES, 3DES, andAES (which is available in 128,192, and 256 versions). When you create a user, with which option must you associate it? 

A. an SNMP group 

B. at least one interface 

C. the SNMP inspection in the global_policy 

D. at least two interfaces 

Answer:

Explanation: This can be verified via the ASDM screen shot shown here: 

Q6. Which two voice protocols can the Cisco ASA inspect? (Choose two.) 

A. MGCP 

B. IAX 

C. Skype 

D. CTIQBE 

Answer: A,D 

Q7. Where on a firewall does an administrator assign interfaces to contexts? 

A. in the system execution space 

B. in the admin context 

C. in a user-defined context 

D. in the console 

Answer:

Q8. Which two TCP ports must be open on the Cisco Security Manager server to allow the server to communicate with the Cisco Security Manager client? (Choose two.) 

A. 1741 

B. 443 

C. 80 

D. 1740 

E. 8080 

Answer: A,B 

Q9. When access rule properties are configured within ASDM, which traffic direction type is required by global and management access rule? 

A. Any 

B. Both in and out 

C. In 

D. Out 

Answer:

Q10. Which three compliance and audit report types are available in Cisco Prime Infrastructure? (Choose three.) 

A. Service 

B. Change Audit 

C. Vendor Advisory 

D. TAC Service Request 

E. Validated Design 

F. Smart Business Architecture 

Answer: A,B,C 

Q11. What is the CLI command to enable SNMPv3 on the Cisco Web Security Appliance? 

A. snmpconfig 

B. snmpenable 

C. configsnmp 

D. enablesnmp 

Answer:

Q12. Which command sets the source IP address of the NetFlow exports of a device? 

A. ip source flow-export 

B. ip source netflow-export 

C. ip flow-export source 

D. ip netflow-export source 

Answer:

Q13. When you set a Cisco IOS Router as an SSH server, which command specifies the RSA public key of the remote peer when you set the SSH server to perform RSA-based authentication? 

A. router(config-ssh-pubkey-user)#key 

B. router(conf-ssh-pubkey-user)#key-string 

C. router(config-ssh-pubkey)#key-string 

D. router(conf-ssh-pubkey-user)#key-string enable ssh 

Answer:

Q14. Enabling what security mechanism can prevent an attacker from gaining network topology information from CDP? 

A. MACsec 

B. Flex VPN 

C. Control Plane Protection 

D. Dynamic Arp Inspection 

Answer:

Q15. Which option is a different type of secondary VLAN? 

A. Transparent 

B. Promiscuous 

C. Virtual 

D. Community 

Answer:

START 300-206 EXAM