<< Prev Question Next Question >>

Question 104/185

If you encounter problems logging in to the Cisco Security Manager 4.4 web server or client or backing up its databases, which account has most likely been improperly modified?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (185q)
Question 1: What is the result of the default ip ssh server authenticate...
Question 2: Which two configurations are the minimum needed to enable EI...
Question 3: Which three options are default settings for NTP parameters ...
Question 4: Which kind of Layer 2 attack targets the STP root bridge ele...
Question 5: You are the administrator of a Cisco ASA 9.0 firewall and ha...
Question 6: On an ASA running version 9.0, which command is used to nest...
Question 7: What is the lowest combination of ASA model and license prov...
Question 8: Which statement describes a unique feature of Cisco NetFlow ...
Question 9: Which command tests authentication with SSH and shows a gene...
Question 10: Which two statements about zone-based firewalls are true? (C...
Question 11: Enabling what security mechanism can prevent an attacker fro...
Question 12: Which three options correctly identify the Cisco ASA1000V Cl...
Question 13: What are three ways to add devices in Cisco Prime Infrastruc...
Question 14: Which three statements about the software requirements for a...
Question 15: You have explicitly added the line deny ipv6 any log to the ...
Question 16: Which statement about traffic zoning in cisco ASA?...
Question 17: An engineer is hardening the management plane for an ASA. Wh...
Question 18: Which hypervisor technology is supported by Cisco ASA 1000V ...
Question 19: Refer to the exhibit. (Exhibit) Which two statements about t...
Question 20: A network engineer has installed Cisco Security Manager 4.7 ...
Question 21: Which command displays syslog messages on the Cisco ASA cons...
Question 22: Which two SNMPv3 features ensure that SNMP packets have been...
Question 23: Enabling what security mechanism can prevent an attacker fro...
Question 24: Which type of object group will allow configuration for both...
Question 25: If you disable PortFast on switch ports that are connected t...
Question 26: Which two features does Cisco Security Manager provide? (Cho...
Question 27: Private VLANs have been configured in the data center. Which...
Question 28: An attacker has gained physical access to a password protect...
Question 29: Where on a firewall does an administrator assign interfaces ...
Question 30: What are two enhancements of SSHv2 over SSHv1? (Choose two.)...
Question 31: Which statement about Cisco Security Manager form factors is...
Question 32: On the Cisco ASA, where are the Layer 5-7 policy maps applie...
Question 33: In the default global policy, which traffic is matched for i...
Question 34: Which two device types can Cisco Prime Security Manager mana...
Question 35: Which Cisco switch technology prevents traffic on a LAN from...
Question 36: When a Cisco ASA is configured in multiple context mode, wit...
Question 37: What are two security features at the access port level that...
Question 38: Which function does DNSSEC provide in a DNS infrastructure?...
Question 39: You are a security engineer at a large multinational retaile...
Question 40: Which two features block traffic that is sourced from non-to...
Question 41: Which three Cisco ASA configuration commands are used to ena...
Question 42: When a traffic storm threshold occurs on a port, into which ...
Question 43: What are three attributes that can be applied to a user acco...
Question 44: You have installed a web server on a private network. Which ...
Question 45: Refer to the exhibit. (Exhibit) Which command can produce th...
Question 46: Refer to the exhibit. (Exhibit) What is the effect of this c...
Question 47: Refer to the exhibit. (Exhibit) Which statement about this a...
Question 48: At which firewall severity level will debugs appear on a Cis...
Question 49: What mean following command arp outside 10.1.1.1 0009.xxxx.2...
Question 50: Which option is a Cisco best practice when configuring traff...
Question 51: If a switch port goes directly into a blocked state only whe...
Question 52: What are three of the RBAC views within Cisco IOS Software? ...
Question 53: Which two features are supported when configuring clustering...
Question 54: What is the best description of a unified ACL on a Cisco fir...
Question 55: Which command is the first that you enter to check whether o...
Question 56: An engineer is configuring Cisco ASA 1000V Cloud Firewall. W...
Question 57: What is the maximum jumbo frame size for IPS standalone appl...
Question 58: Which security operations management best practice should be...
Question 59: Where in the Cisco ASA appliance CLI are Active/Active Failo...
Question 60: How many interfaces can a Cisco ASA bridge group support and...
Question 61: By default, not all services in the default inspection class...
Question 62: What is the primary purpose of stateful pattern recognition ...
Question 63: Which log level provides the most detail on the Cisco Web Se...
Question 64: What is a benefit the iOS control plane protection?...
Question 65: An administrator is deploying port-security to restrict traf...
Question 66: Within Cisco Prime Infrastructure, which configuration Archi...
Question 67: When you configure a Cisco firewall in multiple context mode...
Question 68: When creating a cluster of Cisco ASA firewalls, which featur...
Question 69: Refer to the exhibit. (Exhibit) Server A is a busy server th...
Question 70: The Cisco ASA must support dynamic routing and terminating V...
Question 71: An engineer is applying best practices to stop VLAN hopping ...
Question 72: What is a required attribute to configure NTP authentication...
Question 73: Which three statements about private VLANs are true? (Choose...
Question 74: Refer to the exhibit. (Exhibit) A network engineer is testin...
Question 75: Which statement describes a unifeature of cisco netflow secu...
Question 76: Which technology can be deployed with a Cisco ASA 1000V to s...
Question 77: Refer to the exhibit. (Exhibit) To protect Host A and Host B...
Question 78: Which utility can you use to troubleshoot and determine the ...
Question 79: Which two attacks are common at Layer 2? (Choose two)...
Question 80: Which three statements about transparent firewall are true? ...
Question 81: A Cisco ASA is configured in multiple context mode and has t...
Question 82: Which addresses are considered "ambiguous addresses" and are...
Question 83: Which four are IPv6 First Hop Security technologies? (Choose...
Question 84: When a Cisco ASA is configured in transparent mode, how can ...
Question 85: A Cisco ASA is configured for TLS proxy. When should the sec...
Question 86: Which technology provides forwarding-plane abstraction to su...
Question 87: Which Cisco ASA show command groups the xlates and connectio...
Question 88: Which command change secure HTTP port from 443 to 444?...
Question 89: Which statement describes what the arp outside 1.1.1.1 0192....
Question 90: When configuring packet-tracer command from CLI, what is the...
Question 91: Which two TCP ports must be open on the Cisco Security Manag...
Question 92: To which port does a firewall send secure logging messages?...
Question 93: Which command configures the SNMP server group1 to enable au...
Question 94: When you set a Cisco IOS Router as an SSH server, which comm...
Question 95: Which five options are valid logging destinations for the Ci...
Question 96: In which way are management packets classified on a firewall...
Question 97: Which command enables the HTTP server daemon for Cisco ASDM ...
Question 98: A Cisco ASA requires an additional feature license to enable...
Question 99: You are the administrator of a multicontext transparent-mode...
Question 100: What are two reasons for implementing NIPS at enterprise Int...
Question 101: Which product can manage licenses, updates, and a single sig...
Question 102: Which Cisco ASA object group type offers the most flexibilit...
Question 103: How does the DAI work? (Choose two.)...
Question 104: If you encounter problems logging in to the Cisco Security M...
Question 105: To which interface on a Cisco ASA 1000V firewall should a se...
Question 106: An engineer is trying to configure Dynamic ARP Inspection. W...
Question 107: Which two statements about Cisco IDS are true? (Choose two.)...
Question 108: Which two options are available with cisco security manager ...
Question 109: Refer to the exhibit. Which information is passed between th...
Question 110: IPv6 addresses in an organization's network are assigned usi...
Question 111: Which Cisco Security Manager form factor is recommended for ...
Question 112: Which set of commands creates a message list that includes a...
Question 113: (Exhibit) An SNMP host is an IP address to which SNMP notifi...
Question 114: Which Layer 2 security feature validates ARP packets?...
Question 115: Which statement about the Cisco ASA configuration is true?...
Question 116: (Exhibit) SNMP users have a specified username, a group to w...
Question 117: Which two configurations are necessary to enable password-le...
Question 118: What can an administrator do to simultaneously capture and t...
Question 119: An engineer must secure a LAN infrastructure from potential ...
Question 120: A rogue device has connected to the network and has become t...
Question 121: An administrator installed a Cisco ASA that runs version 9.1...
Question 122: Which URL matches the regex statement "http"*/"www.cisco.com...
Question 123: Which characteristic of community ports in a PVLAN is true?...
Question 124: When configuring security contexts on the Cisco ASA, which t...
Question 125: Which is the minimum RSA crypto key generate for SSH2?...
Question 126: In IOS routers, what configuration can ensure both preventio...
Question 127: Which device can be managed by the Cisco Prime Security Mana...
Question 128: Which statement describes the correct steps to enable Botnet...
Question 129: When troubleshooting redundant interface operations on the C...
Question 130: When you configure a Botnet Traffic Filter on a Cisco firewa...
Question 131: Which statement about SNMP support on the Cisco ASA applianc...
Question 132: Which set of commands enables logging and displays the log b...
Question 133: Refer to the exhibit. (Exhibit) Which two statements about t...
Question 134: A security engineer must evaluate Cisco Security Manager. Wh...
Question 135: Which two statements about Cisco IOS Firewall are true? (Cho...
Question 136: An engineer must implement secure device management on a Cis...
Question 137: Which two router commands enable NetFlow on an interface? (C...
Question 138: Which Cisco TrustSec role does a Cisco ASA firewall serve wi...
Question 139: Which two options are main challenges for public cloud data ...
Question 140: When configuring a new context on a Cisco ASA device, which ...
Question 141: Which statement about the Cisco ASA botnet traffic filter is...
Question 142: When configured in accordance to Cisco best practices, the i...
Question 143: In a Cisco ASAv failover deployment, which interface is prec...
Question 144: Which activity is performed by the switch when Dynamic ARP i...
Question 145: Which function in the Cisco ADSM ACL Manager pane allows an ...
Question 146: What are two primary purposes of Layer 2 detection in Cisco ...
Question 147: An engineer has configured a unified IPV6/IPV4 ACL to be use...
Question 148: Which feature can suppress packet flooding in a network?...
Question 149: Which component does Cisco ASDM require on the host Cisco AS...
Question 150: Refer to the exhibit. (Exhibit) What is the effect of this f...
Question 151: A router is being enabled for SSH command line access. The f...
Question 152: In which two modes is zone-based firewall high availability ...
Question 153: An engineer has been asked to confirm packet process on an A...
Question 154: Which configuration keyword will configure SNMPv3 with authe...
Question 155: You are configuring a Cisco IOS Firewall on a WAN router tha...
Question 156: When an engineer is configuring DHCP snooping, which configu...
Question 157: Which three configurations are needed to enable SNMPv3 suppo...
Question 158: (Exhibit) Which statement about how the Cisco ASA supports S...
Question 159: For which purpose is the Cisco ASA CLI command aaa authentic...
Question 160: On a Cisco ASA, how can you allow traffic to enter and exit ...
Question 161: How many bridge groups are supported on a firewall that oper...
Question 162: At which layer does Dynamic ARP Inspection validate packets?...
Question 163: What are two high-level task areas in a Cisco Prime Infrastr...
Question 164: What are two reasons to implement Cisco IOS MPLS Bandwidth-A...
Question 165: What are the three types of private VLAN ports? (Choose thre...
Question 166: What can you do to enable inter-interface firewall communica...
Question 167: What is the default behavior of an access list on a Cisco AS...
Question 168: Which information does the ASA fail to replicate to the seco...
Question 169: Which option is the default logging buffer size in memory of...
Question 170: Which VTP mode supports private VLANs on a switch?...
Question 171: Which two data and voice protocols does ASA 5500 support? (C...
Question 172: A network engineer must manage and push configurations to a ...
Question 173: Which two VPN types can you monitor and control with Cisco P...
Question 174: What is the default violation mode that is applied by port s...
Question 175: When it is configured in accordance to Cisco best practices,...
Question 176: With Cisco ASA active/standby failover, by default, how many...
Question 177: Which ASA feature is used to keep track of suspected attacke...
Question 178: Which two voice protocols can the Cisco ASA inspect? (Choose...
Question 179: Which statement about Cisco ASA multicast routing support is...
Question 180: At which layer does MACsec provide encryption?...
Question 181: How much storage is allotted to maintain system, configurati...
Question 182: Which of the following that Cisco engineer must secure a cur...
Question 183: It has been reported that an application is not working wher...
Question 184: According to Cisco best practices, which two interface confi...
Question 185: Which two voice and video protocols does the Cisco ASA 5500 ...