300-206 Premium Bundle

300-206 Premium Bundle

Implementing Cisco Edge Network Security Solutions Certification Exam

4.5 
(21945 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-206 Free Practice Questions

Q1. What is the lowest combination of ASA model and license providing 1 Gigabit Ethernet interfaces? 

A. ASA 5505 with failover license option 

B. ASA 5510 Security+ license option 

C. ASA 5520 with any license option 

D. ASA 5540 with AnyConnect Essentials License option 

Answer:

Q2. Which three statements about private VLANs are true? (Choose three.) 

A. Isolated ports can talk to promiscuous and community ports. 

B. Promiscuous ports can talk to isolated and community ports. 

C. Private VLANs run over VLAN Trunking Protocol in client mode. 

D. Private VLANS run over VLAN Trunking Protocol in transparent mode. 

E. Community ports can talk to each other as well as the promiscuous port. 

F. Primary, secondary, and tertiary VLANs are required for private VLAN implementation. 

Answer: B,D,E 

Q3. What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS sessions and HTTPS access? 

A. sslconfig 

B. sslciphers 

C. tlsconifg 

D. certconfig 

Answer:

Q4. Which function in the Cisco ADSM ACL Manager pane allows an administrator to search for a specfic element? 

A. Find 

B. Device Management 

C. Search 

D. Device Setup 

Answer:

Q5. All 30 users on a single floor of a building are complaining about network slowness. After investigating the access switch, the network administrator notices that the MAC address table is full (10,000 entries) and all traffic is being flooded out of every port. Which action can the administrator take to prevent this from occurring? 

A. Configure port-security to limit the number of mac-addresses allowed on each port 

B. Upgrade the switch to one that can handle 20,000 entries 

C. Configure private-vlans to prevent hosts from communicating with one another 

D. Enable storm-control to limit the traffic rate 

E. Configure a VACL to block all IP traffic except traffic to and from that subnet 

Answer:

Q6. What is the default log level on the Cisco Web Security Appliance? 

A. Trace 

B. Debug 

C. Informational 

D. Critical 

Answer:

Q7. Where do you apply a control plane service policy to implement Management Plane Protection on a Cisco router? 

A. Control-plane interface management 0/0 

B. Control-plane service policy 

C. Control-plane router 

D. Control-plane host 

Answer:

Explanation: http://www.cisco.com/c/en/us/td/docs/ios/12_4t/12_4t11/htsecmpp.html 

Q8. When you configure a Botnet Traffic Filter on a Cisco firewall, what are two optional tasks? (Choose two.) 

A. Enable the use of dynamic databases. 

B. Add static entries to the database. 

C. Enable DNS snooping. 

D. Enable traffic classification and actions. 

E. Block traffic manually based on its syslog information. 

Answer: B,E 

Q9. What can an administrator do to simultaneously capture and trace packets in a Cisco ASA? 

A. Install a Cisco ASA virtual appliance. 

B. Use the trace option of the capture command. 

C. Use the trace option of the packet-tracer command. 

D. Install a switch with a code that supports capturing, and configure a trunk to the Cisco ASA. 

Answer:

Q10. What are two primary purposes of Layer 2 detection in Cisco IPS networks? (Choose two.) 

A. identifying Layer 2 ARP attacks 

B. detecting spoofed MAC addresses and tracking 802.1X actions and data communication after a successful client association 

C. detecting and preventing MAC address spoofing in switched environments 

D. mitigating man-in-the-middle attacks 

Answer: A,D 

Q11. Which two options are protocols and tools that are used by the management plane when discussing Cisco ASA general management plane hardening? ( Choose two ) 

A. Unicast Reverse Path Forwarding 

B. NetFlow 

C. Routing Protocol Authentication 

D. Threat detection 

E. Syslog 

F. ICMP unreachables 

G. Cisco URL Filtering 

Answer: B,E 

Explanation: http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html 

Q12. Which configuration keyword will configure SNMPv3 with authentication but no encryption? 

A. Auth 

B. Priv 

C. No auth 

D. Auth priv 

Answer:

Q13. On an ASA running version 9.0, which command is used to nest objects in a pre-existing group? 

A. object-group 

B. network group-object 

C. object-group network 

D. group-object 

Answer:

Q14. Refer to the exhibit. 

Which two statements about the SNMP configuration are true? (Choose two.) 

A. The router's IP address is 192.168.1.1. 

B. The SNMP server's IP address is 192.168.1.1. 

C. Only the local SNMP engine is configured. 

D. Both the local and remote SNMP engines are configured. 

E. The router is connected to the SNMP server via port 162. 

Answer: B,D 

Q15. hich command is the first that you enter to check whether or not ASDM is installed on the ASA? 

A. Show ip 

B. Show running-config asdm 

C. Show running-config boot 

D. Show version 

E. Show route 

Answer:

START 300-206 EXAM