300-206 training materials(31 to 40) for consumer: Mar 2017 Edition

To obtain designed with above and other connected abilities, this hunters get more different options on his or her interest. Cisco 300-206 test classes, program ebooks together with distance-learning sources is one route to take. And some involve on the net 300-206 test preparation methods which include exercise exams, 300-206 e-books, 300-206 analyze publications, 300-206 exercise labs, 300-206 questions, 300-206 computer based teaching, 300-206 audio & movie tests, 300-206 puts and many others. Several 300-206 test applicants will decide on established methods whereas on the net substances be all you need for numerous.


The article at Testaimer.com going over http://www.testaimer.com/300-206-test is very comprehensive.

2017 Mar 300-206 practice exam

Q31. Which three options correctly identify the Cisco ASA1000V Cloud Firewall? (Choose three.) 

A. operates at Layer 2 

B. operates at Layer 3 

C. secures tenant edge traffic 

D. secures intraswitch traffic 

E. secures data center edge traffic 

F. replaces Cisco VSG 

G. complements Cisco VSG 

H. requires Cisco VSG 

Answer: B,C,G 


Q32. CORRECT TEXT 

You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations. 

The CSO has tasked you with enable Botnet traffic filter on the Cisco ASA to detect and deny further connection attempts from infected PCs to malware destinations. You are also required to test your configurations by initiating connections through the Cisco ASA and then display and observe the Real-Time Log Viewer in ASDM. To successfully complete this activity, you must perform the following tasks: 

* Download the dynamic database and enable use of it. 

. Enable the ASA to download of the dynamic database 

. Enable the ASA to download of the dynamic database. 

. Enable DNS snooping for existing DNS inspection service policy rules.. 

. Enable Botnet Traffic Filter classification on the outside interface for All Traffic. 

. Configure the Botnet Traffic Filter to drop blacklisted traffic on the outside interface. Use the default Threat Level settings 

NOTE: The database files are stored in running memory; they are not stored in flash memory. 

NOTE: DNS is enabled on the inside interface and set to the HQ-SRV (10.10.3.20). 

NOTE: Not all ASDM screens are active for this exercise. 

. Verify that the ASA indeed drops traffic to blacklisted destinations by doing the following: 

. From the Employee PC, navigate to http://www.google.com to make sure that access to the Internet is working. 

. From the Employee PC, navigate to http://bot-sparta.no-ip.org. This destination is classified as malware destination by the Cisco SIO database. 

. From the Employee PC, navigate to http://superzarabotok-gid.ru/. This destination is classified as malware destination by the Cisco SIO database. 

. From Admin PC, launch ASDM to display and observe the Real-Time Log Viewer. 

Answer: Use the following configuration to setup in explanation. 


Q33. Which two options are.protocols and tools that are used by the management plane when discussing Cisco ASA general management plane hardening? (Choose two.) 

A. ICMP unreachables 

B. NetFlow 

C. syslog 

D. Routing Protocol Authentication 

E. Cisco URL Filtering 

F. threat detection 

G. Unicast Reverse Path Forwarding 

Answer: B,C 


Q34. Which three options are hardening techniques for Cisco IOS routers? (Choose three.) 

A. limiting access to infrastructure with access control lists 

B. enabling service password recovery 

C. using SSH whenever possible 

D. encrypting the service password 

E. using Telnet whenever possible 

F. enabling DHCP snooping 

Answer: A,C,D 


Q35. Which three options describe how SNMPv3 traps can be securely configured to be sent by 

IOS? (Choose three.) 

A. An SNMPv3 group is defined to configure the read and write views of the group. 

B. An SNMPv3 user is assigned to SNMPv3 group and defines the encryption and authentication credentials. 

C. An SNMPv3 host is configured to define where the SNMPv3 traps will be sent. 

D. An SNMPv3 host is used to configure the encryption and authentication credentials for SNMPv3 traps. 

E. An SNMPv3 view is defined to configure the address of where the traps will be sent. 

F. An SNMPv3 group is used to configure the OIDs that will be reported. 

Answer: A,B,C 


Up to date 300-206 vce:

Q36. Which product can manage licenses, updates, and a single signature policy for 15 separate IPS appliances? 

A. Cisco Security Manager 

B. Cisco IPS Manager Express 

C. Cisco IPS Device Manager 

D. Cisco Adaptive Security Device Manager 

Answer:


Q37. Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license? 

A. Enable DNS snooping, traffic classification, and actions. 

B. Botnet Traffic Filtering is not supported in transparent mode. 

C. Enable the use of the dynamic database, enable DNS snooping, traffic classification, and actions. 

D. Enable the use of dynamic database, enable traffic classification and actions. 

Answer:


Q38. When a traffic storm threshold occurs on a port, into which state can traffic storm control put the port? 

A. Disabled 

B. Err-disabled 

C. Disconnected 

D. Blocked 

E. Connected 

Answer:


Q39. Refer to the exhibit. What type of attack is being mitigated on the Cisco ASA appliance? 

A. HTTP and POST flood attack 

B. HTTP Compromised-Key Attack 

C. HTTP Shockwave Flash exploit 

D. HTTP SQL injection attack 

Answer:


Q40. What are three attributes that can be applied to a user account with RBAC? (Choose three.) 

A. domain 

B. password 

C. ACE tag 

D. user roles 

E. VDC group tag 

F. expiry date 

Answer: B,D,F