EnsurepassQUESTION 41 What command can you use to verify the binding table status?   A. show ip dhcp snooping database B. show ip dhcp snooping binding C. show ip dhcp snooping statistics D. show ip dhcp pool E. show ip dhcp source binding F. show ip dhcp snooping   Correct Answer: A   QUESTION 42 If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use?   A. root guard B. EtherChannel guard C. loop Read more [...]
EnsurepassQUESTION 31 Refer to the exhibit. What is the effect of the given command sequence?     A. It configures IKE Phase 1. B. It configures a site-to-site VPN tunnel. C. It configures a crypto policy with a key size of 14400. D. It configures IPSec Phase 2. Correct Answer: A     QUESTION 32 Refer to the exhibit. What is the effect of the given command sequence?     A. It defines IPSec policy for traffic sourced from with a destination Read more [...]
EnsurepassQUESTION 21 What type of algorithm uses the same key to encrypt and decrypt data?   A. a symmetric algorithm B. an asymmetric algorithm C. a Public Key Infrastructure algorithm D. an IP security algorithm   Correct Answer: A     QUESTION 22 Refer to the exhibit. How many times was a read-only string used to attempt a write operation?     A. 9 B. 6 C. 4 D. 3 E. 2   Correct Answer: A     QUESTION 23 Refer to the Read more [...]
EnsurepassQUESTION 11 Which three statements about host-based IPS are true? (Choose three.)   A. It can view encrypted files. B. It can have more restrictive policies than network-based IPS. C. It can generate alerts based on behavior at the desktop level. D. It can be deployed at the perimeter. E. It uses signature-based policies. F. It works with deployed firewalls.   Correct Answer: ABC     QUESTION 12 What three actions are limitations when running IPS Read more [...]
EnsurepassQUESTION 1 Which two services define cloud networks? (Choose two.)   A. Infrastructure as a Service B. Platform as a Service C. Security as a Service D. Compute as a Service E. Tenancy as a Service   Correct Answer: AB     QUESTION 2 In which two situations should you use out-of-band management? (Choose two.)   A. when a network device fails to forward packets B. when you require ROMMON access C. when management applications need concurrent Read more [...]