[Free] 2018(Mar) EnsurePass Braindumps Cisco 300-206 Dumps with VCE and PDF 21-30

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar Cisco Official New Released 300-206
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Edge Network Security Solutions

Question No: 21

Which option is the Cisco ASA on-box graphical management solution?

  1. SSH

  2. ASDM

  3. Console

  4. CSM

Answer: B

Question No: 22

When configured in accordance to Cisco best practices, the ip verify source command can mitigate which two types of Layer 2 attacks? (Choose two.)

  1. rogue DHCP servers

  2. ARP attacks

  3. DHCP starvation

  4. MAC spoofing

  5. CAM attacks

  6. IP spoofing

Answer: D,F

Question No: 23

Which set of commands enables logging and displays the log buffer on a Cisco ASA?

  1. enable loggingshow logging

  2. logging enableshow logging

  3. enable logging int e0/1view logging

  4. logging enablelogging view config

Answer: B

Question No: 24

Which function does DNSSEC provide in a DNS infrastructure?

  1. It authenticates stored information.

  2. It authorizes stored information.

  3. It encrypts stored information.

  4. It logs stored security information.

Answer: A

Question No: 25

Which security operations management best practice should be followed to enable appropriate network access for administrators?

  1. Provide full network access from dedicated network administration systems

  2. Configure the same management account on every network device

  3. Dedicate a separate physical or logical plane for management traffic

  4. Configure switches as terminal servers for secure device access

Answer: C

Question No: 26

Which Cisco prime Infrastructure features allows you to assign templates to a group of wireless LAN controllers with similar configuration requirements?

  1. Lightweight access point configuration template

  2. Composite template

  3. Controller configuration group

  4. Shared policy object

Answer: C

Question No: 27

What is the default violation mode that is applied by port security?

  1. restrict

  2. protect

  3. shutdown

  4. shutdown VLAN

Answer: C

Question No: 28

On the Cisco ASA, where are the Layer 5-7 policy maps applied?

  1. inside the Layer 3-4 policy map

  2. inside the Layer 3-4 class map

  3. inside the Layer 5-7 class map

  4. inside the Layer 3-4 service policy

  5. inside the Layer 5-7 service policy

Answer: A

Question No: 29

What are two high-level task areas in a Cisco Prime Infrastructure life-cycle workflow? (Choose two.)

  1. Design

  2. Operate

  3. Maintain

  4. Log

  5. Evaluate

Answer: A,B

Question No: 30

A switch is being configured at a new location that uses statically assigned IP addresses. Which will ensure that ARP inspection works as expected?

  1. Configure the #39;no-dhcp#39; keyword at the end of the ip arp inspection command

  2. Enable static arp inspection using the command #39;ip arp inspection static vlan vlan- number

  3. Configure an arp access-list and apply it to the ip arp inspection command

  4. Enable port security

Answer: C

100% Ensurepass Free Download!
Download Free Demo:300-206 Demo PDF
100% Ensurepass Free Guaranteed!
300-206 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.