Which three statements about the software requirements …

Which three statements about the software requirements for a firewall failover configuration are
true? (Choose three.)

Which three statements about the software requirements for a firewall failover configuration are
true? (Choose three.)

A.
The firewalls must be in the same operating mode.

B.
The firewalls must have the same major and minor software version.

C.
The firewalls must be in the same context mode.

D.
The firewalls must have the same major software version but can have different minor versions.

E.
The firewalls can be in different context modes.

F.
The firewalls can have different Cisco AnyConnect images.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Levo

Levo

New 300-206 Questions:

QUESTION 137
When you configure a Cisco firewall in multiple context mode, where do you allocate interfaces?

A. in the system execution space
B. in the admin context
C. in a user-defined context
D. in the global configuration

Answer: A

QUESTION 138
At which layer does Dynamic ARP Inspection validate packets?

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 7

Answer: A

QUESTION 139
Which feature can suppress packet flooding in a network?

A. PortFast
B. BPDU guard
C. Dynamic ARP Inspection
D. storm control

Answer: D

QUESTION 140
What is the default violation mode that is applied by port security?

A. restrict
B. protect
C. shutdown
D. shutdown VLAN

Answer: C

QUESTION 141
What are two security features at the access port level that can help mitigate Layer 2 attacks? (Choose two.)

A. DHCP snooping
B. IP Source Guard
C. Telnet
D. Secure Shell
E. SNMP

Answer: AB

QUESTION 142
At which layer does MACsec provide encryption?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

Answer: B

QUESTION 143
What are two enhancements of SSHv2 over SSHv1? (Choose two.)

A. VRF-aware SSH support
B. DH group exchange support
C. RSA support
D. keyboard-interactive authentication
E. SHA support

Answer: AB

QUESTION 144
What is the result of the default ip ssh server authenticate user command?

A. It enables the public key, keyboard, and password authentication methods.
B. It enables the public key authentication method only.
C. It enables the keyboard authentication method only.
D. It enables the password authentication method only.

Answer: A

More: https://www.braindump2go.com/300-206.html