300-206 Exam Questions - Online Test


300-206 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

It is impossible to pass Cisco 300 206 senss pdf exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed Cisco 300 206 dumps practice questions. You will get a surprising result by our Up to date Implementing Cisco Edge Network Security Solutions practice guides.

Q1. In a Cisco ASAv failover deployment, which interface is preconfigured as the failover interface? 

A. GigabitEthernet0/2 

B. GigabitEthernet0/4 

C. GigabitEthernet0/6 

D. GigabitEthernet0/8 

Answer:


Q2. You are the administrator of a Cisco ASA 9.0 firewall and have been tasked with ensuring that the Firewall Admins Active Directory group has full access to the ASA configuration. The Firewall Operators Active Directory group should have a more limited level of access. 

Which statement describes how to set these access levels? 

A. Use Cisco Directory Agent to configure the Firewall Admins group to have privilege level 15 access. Also configure the Firewall Operators group to have privilege level 6 access. 

B. Use TACACS+ for Authentication and Authorization into the Cisco ASA CLI, with ACS as the AAA server. Configure ACS CLI command authorization sets for the Firewall Operators group. Configure level 15 access to be assigned to members of the Firewall Admins group. 

C. Use RADIUS for Authentication and Authorization into the Cisco ASA CLI, with ACS as the AAA server. Configure ACS CLI command authorization sets for the Firewall Operators group. Configure level 15 access to be assigned to members of the Firewall Admins group. 

D. Active Directory Group membership cannot be used as a determining factor for accessing the Cisco ASA CLI. 

Answer:


Q3. Which three options correctly identify the Cisco ASA1000V Cloud Firewall? (Choose three.) 

A. operates at Layer 2 

B. operates at Layer 3 

C. secures tenant edge traffic 

D. secures intraswitch traffic 

E. secures data center edge traffic 

F. replaces Cisco VSG 

G. complements Cisco VSG 

H. requires Cisco VSG 

Answer: B,C,G 


Q4. Which statement about traffic storm control behavior is true? 

A. Traffic storm control cannot determine if the packet is unicast or broadcast. 

B. If you enable broadcast and multicast traffic storm control and the combined broadcast and multicast traffic exceeds the level within a 1 second traffic storm interval, storm control drops all broadcast and multicast traffic until the end of the storm interval 

C. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast. 

D. Traffic storm control monitors incoming traffic levels over a 10 second traffic storm control interval 

Answer:


Q5. Which command displays syslog messages on the Cisco ASA console as they occur? 

A. Console logging <level> 

B. Logging console <level> 

C. Logging trap <level> 

D. Terminal monitor 

E. Logging monitor <level> 

Answer:


Q6. Which two TCP ports must be open on the Cisco Security Manager server to allow the server to communicate with the Cisco Security Manager client? (Choose two.) 

A. 1741 

B. 443 

C. 80 

D. 1740 

E. 8080 

Answer: A,B 


Q7. You have explicitly added the line deny ipv6 any log to the end of an IPv6 ACL on a router interface. Which two ICMPv6 packet types must you explicitly allow to enable traffic to traverse the interface? (Choose two.) 

A. router solicitation 

B. router advertisement 

C. neighbor solicitation 

D. neighbor advertisement 

E. redirect 

Answer: C,D 


Q8. If you encounter problems logging in to the Cisco Security Manager 4.4 web server or client or backing up its databases, which account has most likely been improperly modified? 

A. admin (the default administrator account) 

B. casuser (the default service account) 

C. guest (the default guest account) 

D. user (the default user account) 

Answer:


Q9. Which function does DNSSEC provide in a DNS infrastructure? 

A. It authenticates stored information. 

B. It authorizes stored information. 

C. It encrypts stored information. 

D. It logs stored security information. 

Answer:


Q10. Which command is used to disable Cisco Discovery Protocol globally on a router? 

A. Cdp disable 

B. No cdp enable 

C. No cdp 

D. No cdp run 

Answer: