Download Cisco.CertDumps.300-206.2017-10-03.1e.16q.vcex

Download Exam

File Info

Exam Implementing Cisco Edge Network Security Solutions
Number 300-206
File Name Cisco.CertDumps.300-206.2017-10-03.1e.16q.vcex
Size 752 Kb
Posted October 03, 2017
Downloads 27

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
All 30 users on a single floor of a building are complaining about network slowness. After investigating the access switch, the network administrator notices that the MAC address table is full (10,000 entries) and all traffic is being flooded out of every port. Which action can the administrator take to prevent this from occurring?

  • A: Configure port-security to limit the number of mac-addresses allowed on each port
  • B: Upgrade the switch to one that can handle 20,000 entries
  • C: Configure private-vlans to prevent hosts from communicating with one another
  • D: Enable storm-control to limit the traffic rate
  • E: Configure a VACL to block all IP traffic except traffic to and from that subnet

Question 2
A network printer has a DHCP server service that cannot be disabled. How can a layer 2 switch be configured to prevent the printer from causing network issues?

  • A: Remove the ip helper-address
  • B: Configure a Port-ACL to block outbound TCP port 68
  • C: Configure DHCP snooping
  • D: Configure port-security

Question 3
A switch is being configured at a new location that uses statically assigned IP addresses. Which will ensure that ARP inspection works as expected?

  • A: Configure the 'no-dhcp' keyword at the end of the ip arp inspection command
  • B: Enable static arp inspection using the command 'ip arp inspection static vlan vlan-number
  • C: Configure an arp access-list and apply it to the ip arp inspection command
  • D: Enable port security

Question 4
Which command is used to nest objects in a pre-existing group?

  • A: object-group
  • B: network group-object
  • C: object-group network
  • D: group-object

Question 5
What is the default behavior of NAT control on Cisco ASA Software Version 8.3?

  • A: NAT control has been deprecated on Cisco ASA Software Version 8.3.
  • B: It will prevent traffic from traversing from one enclave to the next without proper access configuration.
  • C: It will allow traffic to traverse from one enclave to the next without proper access configuration.
  • D: It will deny all traffic.

Question 6
Which three commands can be used to harden a switch? (Choose three.)

  • A: switch(config-if)# spanning-tree bpdufilter enable
  • B: switch(config)# ip dhcp snooping
  • C: switch(config)# errdisable recovery interval 900
  • D: switch(config-if)# spanning-tree guard root
  • E: switch(config-if)# spanning-tree bpduguard disable
  • F: switch(config-if)# no cdp enable

Question 7
Which statement about the Cisco Security Manager 4.4 NAT Rediscovery feature is true?

  • A: It provides NAT policies to existing clients that connect from a new switch port.
  • B: It can update shared policies even when the NAT server is offline.
  • C: It enables NAT policy discovery as it updates shared polices.
  • D: It enables NAT policy rediscovery while leaving existing shared polices unchanged.

Question 8
Which three logging methods are supported by Cisco routers? (Choose three.)

  • A: console logging
  • B: TACACS+ logging
  • C: terminal logging
  • D: syslog logging
  • E: ACL logging
  • F: RADIUS logging

Question 9
What is the primary purpose of stateful pattern recognition in Cisco IPS networks?

  • A: mitigating man-in-the-middle attacks
  • B: using multipacket inspection across all protocols to identify vulnerability-based attacks and to thwart attacks that hide within a data stream
  • C: detecting and preventing MAC address spoofing in switched environments
  • D: identifying Layer 2 ARP attacks

Question 10
What are two reasons to implement Cisco IOS MPLS Bandwidth-Assured Layer 2 Services? (Choose two.)

  • A: guaranteed bandwidth and peak rates as well as low cycle periods, regardless of which systems access the device
  • B: increased resiliency through MPLS FRR for AToM circuits and better bandwidth utilization through MPLS TE
  • C: enabled services over an IP/MPLS infrastructure, for enhanced MPLS Layer 2 functionality
  • D: provided complete proactive protection against frame and device spoofing


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files