★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-206 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/300-206-dumps.html


Q81. Which function does DNSSEC provide in a DNS infrastructure? 

A. It authenticates stored information. 

B. It authorizes stored information. 

C. It encrypts stored information. 

D. It logs stored security information. 

Answer:


Q82. What are two enhancements of SSHv2 over SSHv1? (Choose two.) 

A. VRF-aware SSH support 

B. DH group exchange support 

C. RSA support 

D. keyboard-interactive authentication 

E. SHA support 

Answer: A,B 


Q83. What are three ways to add devices in Cisco Prime Infrastructure? (Choose three.) 

A. Use an automated process. 

B. Import devices from a CSV file. 

C. Add devices manually. 

D. Use RADIUS. 

E. Use the Access Control Server. 

F. Use Cisco Security Manager. 

Answer: A,B,C 


Q84. What are three of the RBAC views within Cisco IOS Software? (Choose three.) 

A. Admin 

B. CLI 

C. Root 

D. Super Admin 

E. Guest 

F. Super 

Answer: B,C,F 


Q85. Which cloud characteristic is used to describes the sharing of physical resource between various 

entities ? 

A. Elasticity 

B. Ubiquitous access 

C. Multitenancy 

D. Resiliency 

Answer:

Explanation: 

http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-3/123_cloud1.html 


Q86. Which Cisco TrustSec role does a Cisco ASA firewall serve within an identity architecture? 

A. Access Requester 

B. Policy Decision Point 

C. Policy Information Point 

D. Policy Administration Point 

E. Policy Enforcement Point 

Answer: E


Q87. What is the primary purpose of stateful pattern recognition in Cisco IPS networks? 

A. mitigating man-in-the-middle attacks 

B. using multipacket inspection across all protocols to identify vulnerability-based attacks and to thwart attacks that hide within a data stream 

C. detecting and preventing MAC address spoofing in switched environments 

D. identifying Layer 2 ARP attacks 

Answer:


Q88. Which three statements about private VLANs are true? (Choose three.) 

A. Isolated ports can talk to promiscuous and community ports. 

B. Promiscuous ports can talk to isolated and community ports. 

C. Private VLANs run over VLAN Trunking Protocol in client mode. 

D. Private VLANS run over VLAN Trunking Protocol in transparent mode. 

E. Community ports can talk to each other as well as the promiscuous port. 

F. Primary, secondary, and tertiary VLANs are required for private VLAN implementation. 

Answer: B,D,E 


Q89. A network printer has a DHCP server service that cannot be disabled. How can a layer 2 switch be configured to prevent the printer from causing network issues? 

A. Remove the ip helper-address 

B. Configure a Port-ACL to block outbound TCP port 68 

C. Configure DHCP snooping 

D. Configure port-security 

Answer:


Q90. Which command is used to disable Cisco Discovery Protocol globally on a router? 

A. Cdp disable 

B. No cdp enable 

C. No cdp 

D. No cdp run 

Answer: