300-206 Exam - Implementing Cisco Edge Network Security Solutions

certleader.com

Q1. IPv6 addresses in an organization's network are assigned using Stateless Address Autoconfiguration. What is a security concern of using SLAAC for IPv6 address assignment? 

A. Man-In-The-Middle attacks or traffic interception using spoofed IPv6 Router Advertisements 

B. Smurf or amplification attacks using spoofed IPv6 ICMP Neighbor Solicitations 

C. Denial of service attacks using TCP SYN floods 

D. Denial of Service attacks using spoofed IPv6 Router Solicitations 

Answer:

Q2. Which two features does Cisco Security Manager provide? (Choose two.) 

A. Configuration and policy deployment before device discovery 

B. Health and performance monitoring 

C. Event management and alerting 

D. Command line menu for troubleshooting 

E. Ticketing management and tracking 

Answer: B,C 

Q3. Which configuration on a switch would be unsuccessful in preventing a DHCP starvation attack? 

A. DHCP snooping 

B. Port security 

C. Source Guard 

D. Rate Limiting 

Answer:

Q4. Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports? 

A. complex threat detection 

B. scanning threat detection 

C. basic threat detection 

D. advanced threat detection 

Answer:

Q5. Which three statements about private VLANs are true? (Choose three.) 

A. Isolated ports can talk to promiscuous and community ports. 

B. Promiscuous ports can talk to isolated and community ports. 

C. Private VLANs run over VLAN Trunking Protocol in client mode. 

D. Private VLANS run over VLAN Trunking Protocol in transparent mode. 

E. Community ports can talk to each other as well as the promiscuous port. 

F. Primary, secondary, and tertiary VLANs are required for private VLAN implementation. 

Answer: B,D,E 

Q6. Refer to the exhibit. What is the effect of this configuration? 

A. The firewall will inspect IP traffic only between networks 192.168.1.0 and 192.168.2.0. 

B. The firewall will inspect all IP traffic except traffic to 192.168.1.0 and 192.168.2.0. 

C. The firewall will inspect traffic only if it is defined within a standard ACL. 

D. The firewall will inspect all IP traffic. 

Answer:

Q7. What are two reasons for implementing NIPS at enterprise Internet edges? (Choose two.) 

A. Internet edges typically have a lower volume of traffic and threats are easier to detect. 

B. Internet edges typically have a higher volume of traffic and threats are more difficult to detect. 

C. Internet edges provide connectivity to the Internet and other external networks. 

D. Internet edges are exposed to a larger array of threats. 

E. NIPS is more optimally designed for enterprise Internet edges than for internal network configurations. 

Answer: C,D 

Q8. Your company is replacing a high-availability pair of Cisco ASA 5550 firewalls with the newer Cisco ASA 5555-X models. Due to budget constraints, one Cisco ASA 5550 will be replaced at a time. 

Which statement about the minimum requirements to set up stateful failover between these two firewalls is true? 

A. You must install the USB failover cable between the two Cisco ASAs and provide a 1 Gigabit Ethernet interface for state exchange. 

B. It is not possible to use failover between different Cisco ASA models. 

C. You must have at least 1 Gigabit Ethernet interface between the two Cisco ASAs for state exchange. 

D. You must use two dedicated interfaces. One link is dedicated to state exchange and the other link is for heartbeats. 

Answer:

Q9. How much storage is allotted to maintain system,configuration , and image files on the Cisco ASA 1000V during OVF template file deployment? 

A. 1GB 

B. 5GB 

C. 2GB 

D. 10GB 

Answer:

Q10. Which ASA feature is used to keep track of suspected attackers who create connections to too many hosts or ports? 

A. complex threat detection 

B. scanning threat detection 

C. basic threat detection 

D. advanced threat detection 

Answer: