300-206 Premium Bundle

300-206 Premium Bundle

Implementing Cisco Edge Network Security Solutions Certification Exam

4.5 
(34545 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-206 Free Practice Questions

Q1. Which two features does Cisco Security Manager provide? (Choose two.) 

A. Configuration and policy deployment before device discovery 

B. Health and performance monitoring 

C. Event management and alerting 

D. Command line menu for troubleshooting 

E. Ticketing management and tracking 

Answer: B,C 

Q2. CORRECT TEXT 

You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations. 

The CSO has tasked you with enable Botnet traffic filter on the Cisco ASA to detect and deny further connection attempts from infected PCs to malware destinations. You are also required to test your configurations by initiating connections through the Cisco ASA and then display and observe the Real-Time Log Viewer in ASDM. To successfully complete this activity, you must perform the following tasks: 

* Download the dynamic database and enable use of it. 

. Enable the ASA to download of the dynamic database 

. Enable the ASA to download of the dynamic database. 

. Enable DNS snooping for existing DNS inspection service policy rules.. 

. Enable Botnet Traffic Filter classification on the outside interface for All Traffic. 

. Configure the Botnet Traffic Filter to drop blacklisted traffic on the outside interface. Use the default Threat Level settings 

NOTE: The database files are stored in running memory; they are not stored in flash memory. 

NOTE: DNS is enabled on the inside interface and set to the HQ-SRV (10.10.3.20). 

NOTE: Not all ASDM screens are active for this exercise. 

. Verify that the ASA indeed drops traffic to blacklisted destinations by doing the following: 

. From the Employee PC, navigate to http://www.google.com to make sure that access to the Internet is working. 

. From the Employee PC, navigate to http://bot-sparta.no-ip.org. This destination is classified as malware destination by the Cisco SIO database. 

. From the Employee PC, navigate to http://superzarabotok-gid.ru/. This destination is classified as malware destination by the Cisco SIO database. 

. From Admin PC, launch ASDM to display and observe the Real-Time Log Viewer. 

Answer: Use the following configuration to setup in explanation. 

Q3. Which three options describe how SNMPv3 traps can be securely configured to be sent by 

IOS? (Choose three.) 

A. An SNMPv3 group is defined to configure the read and write views of the group. 

B. An SNMPv3 user is assigned to SNMPv3 group and defines the encryption and authentication credentials. 

C. An SNMPv3 host is configured to define where the SNMPv3 traps will be sent. 

D. An SNMPv3 host is used to configure the encryption and authentication credentials for SNMPv3 traps. 

E. An SNMPv3 view is defined to configure the address of where the traps will be sent. 

F. An SNMPv3 group is used to configure the OIDs that will be reported. 

Answer: A,B,C 

Q4. Which statement about how the Cisco ASA supports SNMP is true? 

A. All SNMFV3 traffic on the inside interface will be denied by the global ACL 

B. The Cisco ASA and ASASM provide support for network monitoring using SNMP Versions 1,2c, and 3, but do not support the use of all three versions simultaneously. 

C. The Cisco ASA and ASASM have an SNMP agent that notifies designated management ,. stations if events occur that are predefined to require a notification, for example, when a link in the network goes up or down. 

D. SNMPv3 is enabled by default and SNMP v1 and 2c are disabled by default. 

E. SNMPv3 is more secure because it uses SSH as the transport mechanism. 

Answer:

Explanation: 

This can be verified by this ASDM screen shot: 

Q5. When a traffic storm threshold occurs on a port, into which state can traffic storm control put the port? 

A. Disabled 

B. Err-disabled 

C. Disconnected 

D. Blocked 

E. Connected 

Answer:

Q6. What is the best description of a unified ACL on a Cisco firewall? 

A. An ACL with both IPv4 and IPv6 functionality. 

B. An IPv6 ACL with IPv4 backwards compatibility. 

C. An IPv4 ACL with IPv6 support. 

D. An ACL that supports EtherType in addition to IPv6. 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_co nfig/ intro_intro.html 

Q7. Which command is used to nest objects in a pre-existing group? 

A. object-group 

B. network group-object 

C. object-group network 

D. group-object 

Answer:

Q8. What are three attributes that can be applied to a user account with RBAC? (Choose three.) 

A. domain 

B. password 

C. ACE tag 

D. user roles 

E. VDC group tag 

F. expiry date 

Answer: B,D,F 

Q9. Which Cisco Security Manager form factor is recommended for deployments with fewer than 25 devices? 

A. only Cisco Security Manager Standard 

B. only Cisco Security Manager Professional 

C. only Cisco Security Manager UCS Server Bundle 

D. both Cisco Security Manager Standard and Cisco Security Manager Professional 

Answer:

Q10. Which two options are two purposes of the packet-tracer command? (Choose two.) 

A. to filter and monitor ingress traffic to a switch 

B. to configure an interface-specific packet trace 

C. to inject virtual packets into the data path 

D. to debug packet drops in a production network 

E. to correct dropped packets in a production network 

Answer: C,D 

Q11. Which statement is true of the logging configuration on the Cisco ASA? 

A. The contents of the internal buffer will be saved to an FTP server before the buffer is overwritten. 

B. The contents of the internal buffer will be saved to flash memory before the buffer is overwritten. 

C. System log messages with a severity level of six and higher will be logged to the internal buffer. 

D. System log messages with a severity level of six and lower will be logged to the internal buffer. 

Answer:

Explanation: 

\\psf\Home\.Trash\Screen Shot 2015-06-17 at 5.26.32 PM.png 

Q12. In your role as network security administrator, you have installed syslog server software on a server whose IP address is 10.10.2.40. According to the exhibits, why isn’t the syslog server receiving any syslog messages? 

A. Logging is not enabled globally on the Cisco ASA. 

B. The syslog server has failed. 

C. There have not been any events with a severity level of seven. 

D. The Cisco ASA is not configured to log messages to the syslog server at that IP address. 

Answer:

Explanation: By process of elimination, we know that the other answers choices are not correct so that only leaves us with the server must have failed. We can see from the following screen shots, that events are being generated with severity level of debugging and below, The 10.10.2.40 IP address has been configured as a syslog server, and that logging has been enabled globally: 

\\psf\Home\.Trash\Screen Shot 2015-06-11 at 8.38.59 PM.png 

Q13. When configuring a new context on a Cisco ASA device, which command creates a domain for the context? 

A. domain config name 

B. domain-name 

C. changeto/domain name change 

D. domain context 2 

Answer:

Q14. When you configure a Cisco firewall in multiple context mode, where do you allocate interfaces? 

A. in the system execution space 

B. in the admin context 

C. in a user-defined context 

D. in the global configuration 

Answer:

Q15. Which kind of Layer 2 attack targets the STP root bridge election process and allows an attacker to control the flow of traffic? 

A. man-in-the-middle 

B. denial of service 

C. distributed denial of service 

D. CAM overflow 

Answer:

START 300-206 EXAM