Articles in the CCNP Category
Subscribe to the CCNP RSS feed
What is the default behavior of an access list on the Cisco ASA security appliance?
A network printer has a DHCP server service that cannot be disabled. How can a layer 2 switch be configured to block the printer from causing any issues on the network?
Which statements about the Cisco IPS anomaly detection feature are true? (Choose three.)
Which of the following features are supported on the Cisco ASA AIP-SSM, but not supported on the Cisco ASA AIP-SSC? (Choose four.)
What is a valid reason for configuring a list of backup servers on the Cisco AnyConnect VPN Client profile?
When deploying remote-access IPsec VPN tunnels, what is the key benefit of digital certificates?
Refer to the exhibit. Assuming that all other supporting configurations are correct, what can be determined from the partial IP admission configuration?
Refer to the exhibit. What can be determined about IPS updates from the configuration shown?
When 802.1X is implemented, how does the client and authenticator communicate?
On the Cisco Adaptive Security Appliance (ASA), where are the Layer 5 – 7 policy maps applied? A. Inside the Layer 5 – 7 class map. B. Inside the Layer 3 – 4 policy map. C. Inside the Layer 3 – 4 class map. D. Inside the Layer 3 – 4 service policy. Related Resources Cisco White Papers Related Course CCNP Security e-Camp