Cisco® 300-206 Exam Practice Questions (P. 5)
- Full Access (368 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?
- AWhen the Cisco Unified Communications Manager cluster is in non-secure mode
- BWhen the Cisco Unified Communications Manager cluster is in secure mode only
- CWhen the Cisco Unified Communications Manager is not part of a cluster
- DWhen the Cisco ASA is configured for IPSec VPN
Correct Answer:
A
A
send
light_mode
delete
Question #42
Which two features are supported when configuring clustering of multiple Cisco ASA appliances? (Choose two.)
- ANAT
- Bdynamic routing
- CSSL remote access VPN
- DIPSec remote access VPN
Correct Answer:
AB
AB
send
light_mode
delete
Question #43
When a Cisco ASA is configured in transparent mode, how can ARP traffic be controlled?
- ABy enabling ARP inspection; however, it cannot be controlled by an ACL
- BBy enabling ARP inspection or by configuring ACLs
- CBy configuring ACLs; however, ARP inspection is not supported
- DBy configuring NAT and ARP inspection
Correct Answer:
A
A
send
light_mode
delete
Question #44
What are two primary purposes of Layer 2 detection in Cisco IPS networks? (Choose two.)
- Aidentifying Layer 2 ARP attacks
- Bdetecting spoofed MAC addresses and tracking 802.1X actions and data communication after a successful client association
- Cdetecting and preventing MAC address spoofing in switched environments
- Dmitigating man-in-the-middle attacks
Correct Answer:
AD
AD
send
light_mode
delete
Question #45
What is the primary purpose of stateful pattern recognition in Cisco IPS networks?
- Amitigating man-in-the-middle attacks
- Busing multipacket inspection across all protocols to identify vulnerability-based attacks and to thwart attacks that hide within a data stream
- Cdetecting and preventing MAC address spoofing in switched environments
- Didentifying Layer 2 ARP attacks
Correct Answer:
B
B
send
light_mode
delete
Question #46
What are two reasons to implement Cisco IOS MPLS Bandwidth-Assured Layer 2 Services? (Choose two.)
- Aguaranteed bandwidth and peak rates as well as low cycle periods, regardless of which systems access the device
- Bincreased resiliency through MPLS FRR for AToM circuits and better bandwidth utilization through MPLS TE
- Cenabled services over an IP/MPLS infrastructure, for enhanced MPLS Layer 2 functionality
- Dprovided complete proactive protection against frame and device spoofing
Correct Answer:
BC
BC
send
light_mode
delete
Question #47
What is the maximum jumbo frame size for IPS standalone appliances with 1G and 10G fixed or add-on interfaces?
send
light_mode
delete
Question #48
Which two statements about Cisco IDS are true? (Choose two.)
- AIt is preferred for detection-only deployment.
- BIt is used for installations that require strong network-based protection and that include sensor tuning.
- CIt is used to boost sensor sensitivity at the expense of false positives.
- DIt is used to monitor critical systems and to avoid false positives that block traffic.
- EIt is used primarily to inspect egress traffic, to filter outgoing threats.
Correct Answer:
AD
AD
send
light_mode
delete
Question #49
What are two reasons for implementing NIPS at enterprise Internet edges? (Choose two.)
- AInternet edges typically have a lower volume of traffic and threats are easier to detect.
- BInternet edges typically have a higher volume of traffic and threats are more difficult to detect.
- CInternet edges provide connectivity to the Internet and other external networks.
- DInternet edges are exposed to a larger array of threats.
- ENIPS is more optimally designed for enterprise Internet edges than for internal network configurations.
Correct Answer:
CD
CD
send
light_mode
delete
Question #50
Which four are IPv6 First Hop Security technologies? (Choose four.)
- ASend
- BDynamic ARP Inspection
- CRouter Advertisement Guard
- DNeighbor Discovery Inspection
- ETraffic Storm Control
- FPort Security
- GDHCPv6 Guard
Correct Answer:
ACDG
ACDG
send
light_mode
delete
All Pages