Exam information

CCIE Security Exam (4.0)

Other

Which of these is the appropriate configuration on the Cisco ASA


Refer to the Exhibit.Refer to the exhibit. Client1 has an IPsec VPN tunnel established to a Cisco ASA adaptive security appliance in Chicago. The remote access VPN client wants to access www.cisco.com, but split tunneling is disabled. Which of these is the appropriate configuration on the […]

Which of these identifies the correct IP header fields for the IP fragments after fragmentation

A 1200-byte packet arrives on the LAN segment and needs to be fragmented before being forwarded to the egress interface. Which of these identifies the correct IP header fields for the IP fragments after fragmentation (where MF is the More Fragment flag bit, and FO is the Fragment Offset in the […]

What is the name of the unique tool feature in Cisco Security Manager

CORRECT TEXTWhat is the name of the unique tool/feature in Cisco Security Manager that is used the merge an access list based on the source/destination IP address service Or combination of these to provide a manageable view of access policies?A merge rule toolB policy simplification toolC rule […]

The people affected by the modifications?

Which process entails thoughtful planning and sensitive implementation, clear definition of roles and responsibilities, definition of rollback procedures, as well as consultation with, and involvement of, the people affected by the modifications?

Place the following steps in the correct order for PPP callback as specified in RFC 1570

Place the following steps in the correct order for PPP callback, as specified in RFC 1570.1. A PC user (client) connects to the Cisco access server.2. The Cisco IOS Software validates callback rules for this user/line and disconnects the caller for callback.3. PPP authentication is […]


A SYN flood attack is when

A SYN flood attack is when:

When that user telnets into a Cisco router?

Which of the following commands must be present on the router (exact syntax would depend on the version) for the user with priviledge level 15 (as defined in their TACACS+ profile) to be dropped into enabled mode immediately when that user telnets into a Cisco router?

The source address and interface are in the routing table and match the interface that the packet was received on?

What Cisco IOS feature examines packets received to make sure that the source address and interface are in the routing table and match the interface that the packet was received on?

The administrator was able to determine the following

A company just completed the rollout of IP/TV. The first inside network MC client to use the new feature claims they can not access the service. After re-viewing the above ASA Security appliance configuration and network diagram, the administrator was able to determine the following

When implementing internet standards you are required to follow RFC’s processes and procedures based on what RFC?

When implementing internet standards you are required to follow RFC’s processes and procedures based on what RFC?



Page 1 of 6512345...102030...Last »