all PortFast-enabled ports Correct
82. Which feature is specific to the Security Plus upgrade license of an ASA 5505 and provides increased availability? redundant ISP connections routed mode transparent mode stateful packet inspection
redundant ISP connections
83. A company deploys a hub-and-spoke VPN topology where the security appliance is the hub and the remote VPN networks are the spokes. Which VPN method should be used in order for one spoke to communicate with another spoke through the single public interface of the security appliance? split tunneling MPLS GRE Hairpinning
Hairpinning
Assigning a command with multiple keywords allows access to all commands using those keywords.
Commands from a lower level are always executable at a higher level.
85. Which two types of hackers are typically classified as grey hat hackers? (Choose two.) script kiddies vulnerability brokers cyber criminals state-sponsored hackers hacktivists
vulnerability brokers
hacktivists
86. What is the default preconfigured interface for the outside network on a Cisco ASA 5505? VLAN 2 Ethernet 0/2 Ethernet 0/1 VLAN 1
VLAN 2
87. A user successfully logs in to a corporate network via a VPN connection. Which part of the AAA process records that a certain user performed a specific operation at a particular date and time? authentication accounting access authorization
accounting
88. What determines which switch becomes the STP root bridge for a given VLAN? the lowest bridge ID the highest MAC address the highest priority the lowest IP address
lowest
to encapsulate multiple OSI Layer 3 protocol packet types inside an IP tunnel
the layer 2 address with the lowest hexadecimal value
Hashing algorithm
92. What type of ACL is designed for use in the configuration of an ASA to support filtering for clientless SSL VPN’s? Webtype Standard Ethertype Extended
Webtype
none
Network security testing proactively evaluates the effectiveness of the proposal before any real threat occurs.