300-206 Premium Bundle

300-206 Premium Bundle

Implementing Cisco Edge Network Security Solutions Certification Exam

4.5 
(34365 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-206 Free Practice Questions

Q1. An SNMP host is an IP address to which SNMP notifications and traps are sent. To configure SNMFV3 hosts, which option must you configure in addition to the target IP address? 

A. the Cisco ASA as a DHCP server, so the SNMFV3 host can obtain an IP address 

B. a username, because traps are only sent to a configured user 

C. SSH, so the user can connect to the Cisco ASA 

D. the Cisco ASA with a dedicated interface only for SNMP, to process the SNMP host traffic. 

Answer:

Explanation: The username can be seen here on the ASDM simulator screen shot: 

Q2. Which option describes the enhancements that SNMPv3 adds over 1 and 2 versions? 

A. Predefined events that generate message from the SNMP agent to the NMS 

B. Addition of authentication and privacy options 

C. Cleartext transmission of data between SNMP server and SNMP agent 

D. Addition of the ability to predefine events using traps 

E. Pooling of devices using GET-NEXT requests 

F. Use of the object identifier 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.html 

Q3. What are three of the RBAC views within Cisco IOS Software? (Choose three.) 

A. Admin 

B. CLI 

C. Root 

D. Super Admin 

E. Guest 

F. Super 

Answer: B,C,F 

Q4. Which three options are hardening techniques for Cisco IOS routers? (Choose three.) 

A. limiting access to infrastructure with access control lists 

B. enabling service password recovery 

C. using SSH whenever possible 

D. encrypting the service password 

E. using Telnet whenever possible 

F. enabling DHCP snooping 

Answer: A,C,D 

Q5. Refer to the exhibit. 

Which option describes the expected result of the capture ACL? 

A. The capture is applied, but we cannot see any packets in the capture 

B. The capture does not get applied and we get an error about mixed policy. 

C. The capture is applied and we can see the packets in the capture 

D. The capture is not applied because we must have a host IP as the source 

Answer:

Q6. CORRECT TEXT 

You are a network security engineer for the Secure-X network. You have been tasked with implementing dynamic network object NAT with PAT on a Cisco ASA. 

You must configure the Cisco ASA such that the source IP addresses of all internal hosts are translated to a single IP address (using different ports) when the internal hosts access the Internet. 

To successfully complete this activity, you must perform the following tasks: 

. Use the Cisco ASDM GUI on the Admin PC to configure dynamic network object NAT with PAT using the following parameters: 

. Network object name: Internal-Networks 

. IP subnet: 10.10.0.0/16 

. Translated IP address: 192.0.2.100 

. Source interface: inside 

. Destination interface: outside 

NOTE: The object (TRANSLATED-INSIDE-HOSTS) for this translated IP address has already been created for your use in this activity. 

NOTE: Not all ASDM screens are active for this exercise. 

NOTE: Login credentials are not needed for this simulation. 

. In the Cisco ASDM, display and view the auto-generated NAT rule. 

. From the Employee PC, generate traffic to SP-SRV by opening a browser and navigating to http://sp-srv.sp.public. 

. From the Guest PC, generate traffic to SP-SRV by opening a browser and navigating to http://sp-srv.sp.public. 

. At the CLI of the Cisco ASA, display your NAT configuration. You should see the configured policy and statistics for translated packets. 

. At the CLI of the Cisco ASA, display the translation table. You should see dynamic translations for the Employee PC and the Guest PC. Both inside IP addresses translate to the same IP address, but using different ports. 

You have completed this exercise when you have configured and successfully tested dynamic network object NAT with PAT. 

Answer: Use the following configuration as per exhibit in explanation. 

Q7. When you configure a Botnet Traffic Filter on a Cisco firewall, what are two optional tasks? (Choose two.) 

A. Enable the use of dynamic databases. 

B. Add static entries to the database. 

C. Enable DNS snooping. 

D. Enable traffic classification and actions. 

E. Block traffic manually based on its syslog information. 

Answer: B,E 

Q8. Your company is replacing a high-availability pair of Cisco ASA 5550 firewalls with the newer Cisco ASA 5555-X models. Due to budget constraints, one Cisco ASA 5550 will be replaced at a time. 

Which statement about the minimum requirements to set up stateful failover between these two firewalls is true? 

A. You must install the USB failover cable between the two Cisco ASAs and provide a 1 Gigabit Ethernet interface for state exchange. 

B. It is not possible to use failover between different Cisco ASA models. 

C. You must have at least 1 Gigabit Ethernet interface between the two Cisco ASAs for state exchange. 

D. You must use two dedicated interfaces. One link is dedicated to state exchange and the other link is for heartbeats. 

Answer:

Q9. A Cisco ASA is configured in multiple context mode and has two user-defined contexts—Context_A and Context_B. From which context are device logging messages sent? 

A. Admin 

B. Context_A 

C. Context_B 

D. System 

Answer:

Q10. Which component does Cisco ASDM require on the host Cisco ASA 5500 Series or Cisco PIX security appliance? 

A. a DES or 3DES license 

B. a NAT policy server 

C. a SQL database 

D. a Kerberos key 

E. a digital certificate 

Answer:

Q11. Enabling what security mechanism can prevent an attacker from gaining network topology information from CDP? 

A. MACsec 

B. Flex VPN 

C. Control Plane Protection 

D. Dynamic Arp Inspection 

Answer:

Q12. Which option lists cloud deployment models? 

A. Private, public, hybrid, shared 

B. Private, public, hybrid 

C. IaaS, PaaS, SaaS 

D. Private, public, hybrid, community 

Answer:

Explanation: https://www.ibm.com/developerworks/community/blogs/722f6200-f4ca-4eb3-9d64-8d2b58b2d4e8/entry/4_Types_of_Cloud_Computing_Deployment_Model_You_Need_to_K now1 ?lang=en 

Q13. Which option is a different type of secondary VLAN? 

A. Transparent 

B. Promiscuous 

C. Virtual 

D. Community 

Answer:

Q14. Which information is NOT replicated to the secondary Cisco ASA adaptive security appliance in an active/standby configuration with stateful failover links ? 

A. TCP sessions 

B. DHCP lease 

C. NAT translations 

D. Routing tables 

Answer:

Q15. Refer to the exhibit. 

Which two statements about this firewall output are true? (Choose two.) 

A. The output is from a packet tracer debug. 

B. All packets are allowed to 192.168.1.0 255.255.0.0. 

C. All packets are allowed to 192.168.1.0 255.255.255.0. 

D. All packets are denied. 

E. The output is from a debug all command. 

Answer: A,C 

START 300-206 EXAM