300-206 Premium Bundle

300-206 Premium Bundle

Implementing Cisco Edge Network Security Solutions Certification Exam

4.5 
(25110 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-206 Free Practice Questions

Q1. You have installed a web server on a private network. Which type of NAT must you implement to enable access to the web server for public Internet users? 

A. static NAT 

B. dynamic NAT 

C. network object NAT 

D. twice NAT 

Answer:

Q2. Refer to the exhibit. 

Which statement about this access list is true? 

A. This access list does not work without 6to4 NAT 

B. IPv6 to IPv4 traffic permitted on the Cisco ASA by default 

C. This access list is valid and works without additional configuration 

D. This access list is not valid and does not work at all 

E. We can pass only IPv6 to IPv6 and IPv4 to IPv4 traffic 

Answer:

Q3. A network engineer is troubleshooting and configures the ASA logging level to debugging. The logging-buffer is dominated by %ASA-6-305009 log messages. Which command suppresses those syslog messages while maintaining ability to troubleshoot? 

A. no logging buffered 305009 

B. message 305009 disable 

C. no message 305009 logging 

D. no logging message 305009 

Answer:

Q4. You are the administrator of a Cisco ASA 9.0 firewall and have been tasked with ensuring that the Firewall Admins Active Directory group has full access to the ASA configuration. The Firewall Operators Active Directory group should have a more limited level of access. 

Which statement describes how to set these access levels? 

A. Use Cisco Directory Agent to configure the Firewall Admins group to have privilege level 15 access. Also configure the Firewall Operators group to have privilege level 6 access. 

B. Use TACACS+ for Authentication and Authorization into the Cisco ASA CLI, with ACS as the AAA server. Configure ACS CLI command authorization sets for the Firewall Operators group. Configure level 15 access to be assigned to members of the Firewall Admins group. 

C. Use RADIUS for Authentication and Authorization into the Cisco ASA CLI, with ACS as the AAA server. Configure ACS CLI command authorization sets for the Firewall Operators group. Configure level 15 access to be assigned to members of the Firewall Admins group. 

D. Active Directory Group membership cannot be used as a determining factor for accessing the Cisco ASA CLI. 

Answer:

Q5. Which feature is a limitation of a Cisco ASA 5555-X running 8.4.5 version with multiple contexts? 

A. Deep packet inspection 

B. Packet tracer 

C. IPsec 

D. Manual/auto NAT 

E. Multipolicy packet capture 

Answer:

Q6. Which two configurations are necessary to enable password-less SSH login to an IOS router? (Choose two.) 

A. Enter a copy of the administrator's public key within the SSH key-chain 

B. Enter a copy of the administrator's private key within the SSH key-chain 

C. Generate a 512-bit RSA key to enable SSH on the router 

D. Generate an RSA key of at least 768 bits to enable SSH on the router 

E. Generate a 512-bit ECDSA key to enable SSH on the router 

F. Generate a ECDSA key of at least 768 bits to enable SSH on the router 

Answer: A,D 

Q7. Which statement about Cisco IPS Manager Express is true? 

A. It provides basic device management for large-scale deployments. 

B. It provides a GUI for configuring IPS sensors and security modules. 

C. It enables communication with Cisco ASA devices that have no administrative access. 

D. It provides greater security than simple ACLs. 

Answer:

Q8. Which log level provides the most detail on the Cisco Web Security Appliance? 

A. Debug 

B. Critical 

C. Trace 

D. Informational 

Answer:

Q9. How much storage is allotted to maintain system,configuration , and image files on the Cisco ASA 1000V during OVF template file deployment? 

A. 1GB 

B. 5GB 

C. 2GB 

D. 10GB 

Answer:

Q10. Refer to the exhibit. 

Which type of ACL is shown in this configuration? 

A. IPv4 

B. IPv6 

C. unified 

D. IDFW 

Answer:

Q11. Which statement about how the Cisco ASA supports SNMP is true? 

A. All SNMFV3 traffic on the inside interface will be denied by the global ACL 

B. The Cisco ASA and ASASM provide support for network monitoring using SNMP Versions 1,2c, and 3, but do not support the use of all three versions simultaneously. 

C. The Cisco ASA and ASASM have an SNMP agent that notifies designated management ,. stations if events occur that are predefined to require a notification, for example, when a link in the network goes up or down. 

D. SNMPv3 is enabled by default and SNMP v1 and 2c are disabled by default. 

E. SNMPv3 is more secure because it uses SSH as the transport mechanism. 

Answer:

Explanation: 

This can be verified by this ASDM screen shot: 

Q12. Which of the following would need to be created to configure an application-layer inspection of SMTP traffic operating on port 2525? 

A. A class-map that matches port 2525 and applying an inspect ESMTP policy-map for that class in the global inspection policy 

B. A policy-map that matches port 2525 and applying an inspect ESMTP class-map for that policy 

C. An access-list that matches on TCP port 2525 traffic and applying it on an interface with the inspect option 

D. A class-map that matches port 2525 and applying it on an access-list using the inspect option 

Answer:

Q13. Which command configures the SNMP server group1 to enable authentication for members of the access list east? 

A. snmp-server group group1 v3 auth access east 

B. snmp-server group1 v3 auth access east 

C. snmp-server group group1 v3 east 

D. snmp-server group1 v3 east access 

Answer:

Q14. Refer to the exhibit. What is the effect of this configuration? 

A. The firewall will inspect IP traffic only between networks 192.168.1.0 and 192.168.2.0. 

B. The firewall will inspect all IP traffic except traffic to 192.168.1.0 and 192.168.2.0. 

C. The firewall will inspect traffic only if it is defined within a standard ACL. 

D. The firewall will inspect all IP traffic. 

Answer:

Q15. CORRECT TEXT 

You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations. 

The CSO has tasked you with enable Botnet traffic filter on the Cisco ASA to detect and deny further connection attempts from infected PCs to malware destinations. You are also required to test your configurations by initiating connections through the Cisco ASA and then display and observe the Real-Time Log Viewer in ASDM. To successfully complete this activity, you must perform the following tasks: 

* Download the dynamic database and enable use of it. 

. Enable the ASA to download of the dynamic database 

. Enable the ASA to download of the dynamic database. 

. Enable DNS snooping for existing DNS inspection service policy rules.. 

. Enable Botnet Traffic Filter classification on the outside interface for All Traffic. 

. Configure the Botnet Traffic Filter to drop blacklisted traffic on the outside interface. Use the default Threat Level settings 

NOTE: The database files are stored in running memory; they are not stored in flash memory. 

NOTE: DNS is enabled on the inside interface and set to the HQ-SRV (10.10.3.20). 

NOTE: Not all ASDM screens are active for this exercise. 

. Verify that the ASA indeed drops traffic to blacklisted destinations by doing the following: 

. From the Employee PC, navigate to http://www.google.com to make sure that access to the Internet is working. 

. From the Employee PC, navigate to http://bot-sparta.no-ip.org. This destination is classified as malware destination by the Cisco SIO database. 

. From the Employee PC, navigate to http://superzarabotok-gid.ru/. This destination is classified as malware destination by the Cisco SIO database. 

. From Admin PC, launch ASDM to display and observe the Real-Time Log Viewer. 

Answer: Use the following configuration to setup in explanation. 

START 300-206 EXAM