Cause all that matters here is passing the Cisco 300 206 senss pdf exam. Cause all that you need is a high score of 300 206 senss pdf Implementing Cisco Edge Network Security Solutions exam. The only one thing you need to do is downloading Actualtests cisco 300 206 exam study guides now. We will not let you down with our money-back guarantee.

Q1. CORRECT TEXT 

You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations. 

The CSO has tasked you with enable Botnet traffic filter on the Cisco ASA to detect and deny further connection attempts from infected PCs to malware destinations. You are also required to test your configurations by initiating connections through the Cisco ASA and then display and observe the Real-Time Log Viewer in ASDM. To successfully complete this activity, you must perform the following tasks: 

* Download the dynamic database and enable use of it. 

. Enable the ASA to download of the dynamic database 

. Enable the ASA to download of the dynamic database. 

. Enable DNS snooping for existing DNS inspection service policy rules.. 

. Enable Botnet Traffic Filter classification on the outside interface for All Traffic. 

. Configure the Botnet Traffic Filter to drop blacklisted traffic on the outside interface. Use the default Threat Level settings 

NOTE: The database files are stored in running memory; they are not stored in flash memory. 

NOTE: DNS is enabled on the inside interface and set to the HQ-SRV (10.10.3.20). 

NOTE: Not all ASDM screens are active for this exercise. 

. Verify that the ASA indeed drops traffic to blacklisted destinations by doing the following: 

. From the Employee PC, navigate to http://www.google.com to make sure that access to the Internet is working. 

. From the Employee PC, navigate to http://bot-sparta.no-ip.org. This destination is classified as malware destination by the Cisco SIO database. 

. From the Employee PC, navigate to http://superzarabotok-gid.ru/. This destination is classified as malware destination by the Cisco SIO database. 

. From Admin PC, launch ASDM to display and observe the Real-Time Log Viewer. 

Answer: Use the following configuration to setup in explanation. 


Q2. Which command is used to nest objects in a pre-existing group? 

A. object-group 

B. network group-object 

C. object-group network 

D. group-object 

Answer:


Q3. An attacker has gained physical access to a password protected router. Which command will prevent access to the startup-config in NVRAM? 

A. no service password-recovery 

B. no service startup-config 

C. service password-encryption 

D. no confreg 0x2142 

Answer:


Q4. Which ASA feature is used to keep track of suspected attackers who create connections to too many hosts or ports? 

A. complex threat detection 

B. scanning threat detection 

C. basic threat detection 

D. advanced threat detection 

Answer:


Q5. Which component does Cisco ASDM require on the host Cisco ASA 5500 Series or Cisco PIX security appliance? 

A. a DES or 3DES license 

B. a NAT policy server 

C. a SQL database 

D. a Kerberos key 

E. a digital certificate 

Answer:


Q6. When configuring a new context on a Cisco ASA device, which command creates a domain for the context? 

A. domain config name 

B. domain-name 

C. changeto/domain name change 

D. domain context 2 

Answer:


Q7. Which configuration on a switch would be unsuccessful in preventing a DHCP starvation attack? 

A. DHCP snooping 

B. Port security 

C. Source Guard 

D. Rate Limiting 

Answer:


Q8. The Cisco Email Security Appliance can be managed with both local and external users of different privilege levels. What three external modes of authentication are supported? (Choose three.) 

A. LDAP authentication 

B. RADIUS Authentication 

C. TACAS 

D. SSH host keys 

E. Common Access Card Authentication 

F. RSA Single use tokens 

Answer: A,B,D 


Q9. Which statement about Cisco ASA NetFlow v9 (NSEL) is true? 

A. NSEL events match all traffic classes in parallel 

B. NSEL is has a time interval locked at 20 seconds and is not user configurable 

C. NSEL tracks flow-create, flow-teardown, and flow-denied events and generates appropriate NSEL data records 

D. You cannot disable syslog messages that have become redundant because of NSEL 

E. NSEL tracks the flow continuously and provides updates every 10 second 

F. NSEL provides stateless IP flow tracking that exports all record od a specific flow 

Answer:

Explanation: 

http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/monitor _nsel. Html 


Q10. A network administrator is creating an ASA-CX administrative user account with the following parameters: 

The user will be responsible for configuring security policies on network devices. 

The user needs read-write access to policies. 

The account has no more rights than necessary for the job. 

What role will the administrator assign to the user? 

A. Administrator 

B. Security administrator 

C. System administrator 

D. Root Administrator 

E. Exec administrator 

Answer:


Q11. Which three options are default settings for NTP parameters on a Cisco ASA? (Choose three.) 

A. NTP authentication is enabled. 

B. NTP authentication is disabled. 

C. NTP logging is enabled. 

D. NTP logging is disabled. 

E. NTP traffic is not restricted. 

F. NTP traffic is restricted. 

Answer: B,D,E 


Q12. Which cloud characteristic is used to describe the sharing of physical resources 

between various entities? 

A. Multitenancy 

B. Ubiquitous access 

C. Elasticity 

D. Resiliency 

Answer:


Q13. Which two SNMPv3 features ensure that SNMP packets have been sent securely?" Choose two. 

A. host authorization 

B. authentication 

C. encryption 

D. compression 

Answer: B,C 


Q14. CORRECT TEXT 

You are a network security engineer for the Secure-X network. You have been tasked with 

implementing dynamic network object NAT with PAT on a Cisco ASA. You must configure the Cisco ASA such that the source IP addresses of all internal hosts are translated to a single IP address (using different ports) when the internal hosts access the Internet. 

To successfully complete this activity, you must perform the following tasks: 

. Use the Cisco ASDM GUI on the Admin PC to configure dynamic network object NAT with PAT using the following parameters: 

. Network object name: Internal-Networks 

. IP subnet: 10.10.0.0/16 

. Translated IP address: 192.0.2.100 

. Source interface: inside 

. Destination interface: outside 

NOTE: The object (TRANSLATED-INSIDE-HOSTS) for this translated IP address has already been created for your use in this activity. 

NOTE: Not all ASDM screens are active for this exercise. 

NOTE: Login credentials are not needed for this simulation. 

. In the Cisco ASDM, display and view the auto-generated NAT rule. 

. From the Employee PC, generate traffic to SP-SRV by opening a browser and navigating to http://sp-srv.sp.public. 

. From the Guest PC, generate traffic to SP-SRV by opening a browser and navigating to http://sp-srv.sp.public. 

. At the CLI of the Cisco ASA, display your NAT configuration. You should see the configured policy and statistics for translated packets. 

. At the CLI of the Cisco ASA, display the translation table. You should see dynamic translations for the Employee PC and the Guest PC. Both inside IP addresses translate to the same IP address, but using different ports. 

You have completed this exercise when you have configured and successfully tested dynamic network object NAT with PAT. 

Answer: See the explanation for detailed answer to this sim question. 


Q15. Where do you apply a control plane service policy to implement Management Plane Protection on a Cisco router? 

A. Control-plane interface management 0/0 

B. Control-plane service policy 

C. Control-plane router 

D. Control-plane host 

Answer:

Explanation: http://www.cisco.com/c/en/us/td/docs/ios/12_4t/12_4t11/htsecmpp.html