♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-206 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-206 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/300-206-exam-dumps.html

Q91. Which two statements about Cisco IDS are true? (Choose two.) 

A. It is preferred for detection-only deployment. 

B. It is used for installations that require strong network-based protection and that include sensor tuning. 

C. It is used to boost sensor sensitivity at the expense of false positives. 

D. It is used to monitor critical systems and to avoid false positives that block traffic. 

E. It is used primarily to inspect egress traffic, to filter outgoing threats. 

Answer: A,D 


Q92. What is the CLI command to enable SNMPv3 on the Cisco Web Security Appliance? 

A. snmpconfig 

B. snmpenable 

C. configsnmp 

D. enablesnmp 

Answer:


Q93. A network engineer is asked to configure NetFlow to sample one of every 100 packets on a router's fa0/0 interface. Which configuration enables sampling, assuming that NetFlow is already configured and running on the router's fa0/0 interface? 

A. flow-sampler-map flow1 

mode random one-out-of 100 

interface fas0/0 

flow-sampler flow1 

B. flow monitor flow1 

mode random one-out-of 100 

interface fas0/0 

ip flow monitor flow1 

C. flow-sampler-map flow1 

one-out-of 100 

interface fas0/0 

flow-sampler flow1 

D. ip flow-export source fas0/0 one-out-of 100 

Answer:


Q94. Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices? 

A. Prime Infrastructure 

B. Prime Assurance 

C. Prime Network Registrar 

D. Prime Network Analysis Module 

Answer:


Q95. According to the logging configuration on the Cisco ASA, what will happen if syslog server 10.10.2.40 fails? 

A. New connections through the ASA will be blocked and debug system logs will be sent to the internal buffer. 

B. New connections through the ASA will be blocked and informational system logs will be sent to the internal buffer. 

C. New connections through the ASA will be blocked and system logs will be sent to server 10.10.2.41. 

D. New connections through the ASA will be allowed and system logs will be sent to server 10.10.2.41. 

E. New connections through the ASA will be allowed and informational system logs will be sent to the internal buffer. 

F. New connections through the ASA will be allowed and debug system logs will be sent to the internal buffer. 

Answer:

Explanation: 

This is shown by the following screen shot: 

\psfHomeDesktopScreen Shot 2015-06-17 at 5.26.32 PM.png 


Q96. What are two security features at the access port level that can help mitigate Layer 2 attacks? (Choose two.) 

A. DHCP snooping 

B. IP Source Guard 

C. Telnet 

D. Secure Shell 

E. SNMP 

Answer: A,B 


Q97. Which option describes the enhancements that SNMPv3 adds over 1 and 2 versions? 

A. Predefined events that generate message from the SNMP agent to the NMS 

B. Addition of authentication and privacy options 

C. Cleartext transmission of data between SNMP server and SNMP agent 

D. Addition of the ability to predefine events using traps 

E. Pooling of devices using GET-NEXT requests 

F. Use of the object identifier 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.html 


Q98. Which cloud characteristic is used to describe the sharing of physical resources 

between various entities? 

A. Multitenancy 

B. Ubiquitous access 

C. Elasticity 

D. Resiliency 

Answer:


Q99. Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall? 

A. packet tracer 

B. ping 

C. traceroute 

D. SNMP walk 

Answer:


Q100. Which set of commands creates a message list that includes all severity 2 (critical) messages on a Cisco security device? 

A. logging list critical_messages level 2 

console logging critical_messages 

B. logging list critical_messages level 2 

logging console critical_messages 

C. logging list critical_messages level 2 

logging console enable critical_messages 

D. logging list enable critical_messages level 2 

console logging critical_messages 

Answer: