300-206 Exam - Implementing Cisco Edge Network Security Solutions

certleader.com

Q1. Which two options are.protocols and tools that are used by the management plane when discussing Cisco ASA general management plane hardening? (Choose two.) 

A. ICMP unreachables 

B. NetFlow 

C. syslog 

D. Routing Protocol Authentication 

E. Cisco URL Filtering 

F. threat detection 

G. Unicast Reverse Path Forwarding 

Answer: B,C 

Q2. Refer to the exhibit. 

Which two statements about this firewall output are true? (Choose two.) 

A. The output is from a packet tracer debug. 

B. All packets are allowed to 192.168.1.0 255.255.0.0. 

C. All packets are allowed to 192.168.1.0 255.255.255.0. 

D. All packets are denied. 

E. The output is from a debug all command. 

Answer: A,C 

Q3. Which option is the default logging buffer size In memory of the Cisco ASA adaptive security appliance? 

A. 8KB 

B. 32KB 

C. 2KB 

D. 16KB 

E. 4KB 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_gen eral_c onfig/ monitor_syslog.html 

Q4. Which two features block traffic that is sourced from non-topological IPv6 addresses? (Choose two.) 

A. DHCPv6 Guard 

B. IPv6 Prefix Guard 

C. IPv6 RA Guard 

D. IPv6 Source Guard 

Answer: B,D 

Q5. According to Cisco best practices, which two interface configuration commands help prevent VLAN hopping attacks? (Choose two.) 

A. switchport mode access 

B. switchport access vlan 2 

C. switchport mode trunk 

D. switchport access vlan 1 

E. switchport trunk native vlan 1 

F. switchport protected 

Answer: A,B 

Q6. Which command displays syslog messages on the Cisco ASA console as they occur? 

A. Console logging <level> 

B. Logging console <level> 

C. Logging trap <level> 

D. Terminal monitor 

E. Logging monitor <level> 

Answer:

Q7. A network engineer is troubleshooting and configures the ASA logging level to debugging. The logging-buffer is dominated by %ASA-6-305009 log messages. Which command suppresses those syslog messages while maintaining ability to troubleshoot? 

A. no logging buffered 305009 

B. message 305009 disable 

C. no message 305009 logging 

D. no logging message 305009 

Answer:

Q8. Refer to the exhibit. 

What traffic is being captured by the Cisco ASA adaptive security appliance? 

A. UDP traffic sourced from host 10.10.0.12 on port 80 

B. TCP traffic destined to host 10.10.0.12 on port 80 

C. TCP traffic sourced from host 10.10.0.12 on port 80 

D. UDP traffic destined to host 10.10.0.12 on port 80 

Answer:

Q9. A router is being enabled for SSH command line access. The following steps have been taken: 

. The vty ports have been configured with transport input SSH and login local. 

. Local user accounts have been created. 

. The enable password has been configured. 

What additional step must be taken if users receive a 'connection refused' error when attempting to access the router via SSH? 

A. A RSA keypair must be generated on the router 

B. An access list permitting SSH inbound must be configured and applied to the vty ports 

C. An access list permitting SSH outbound must be configured and applied to the vty ports 

D. SSH v2.0 must be enabled on the router 

Answer:

Q10. Which two router commands enable NetFlow on an interface? (Choose two.) 

A. ip flow ingress 

B. ip flow egress 

C. ip route-cache flow infer-fields 

D. ip flow ingress infer-fields 

E. ip flow-export version 9 

Answer: A,B