Which three statements about host-based IPS are true? (Choose three.)

Which three statements about host-based IPS are true? (Choose three.)A . It can view encrypted files.B . It can have more restrictive policies than network-based IPD . It can generate alerts based on behavior at the desktop level.E . It can be deployed at the perimeter.F . It uses signature-based...

October 2, 2018 No Comments READ MORE +

Which network device does NTP authenticate?

Which network device does NTP authenticate?A . Only the time sourceB . Only the client deviceC . The firewall and the client deviceD . The client device and the time sourceView AnswerAnswer: A

October 1, 2018 No Comments READ MORE +

Which option is a key security component of an MDM deployment?

Which option is a key security component of an MDM deployment?A . using MS-CHAPv2 as the primary EAP method.B . using self-signed certificates to validate the server.C . using network-specific installer packagesD . using an application tunnel by default.View AnswerAnswer: B

October 1, 2018 No Comments READ MORE +

Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?

Which feature of the Cisco Email Security Appliance can mitigate the impact of snowshoe spam and sophisticated phishing attacks?A . contextual analysisB . holistic understanding of threatsC . graymail management and filteringD . signature-based IPSView AnswerAnswer: A

October 1, 2018 No Comments READ MORE +

What is the primary purpose of a defined rule in an IPS?

What is the primary purpose of a defined rule in an IPS?A . to configure an event action that takes place when a signature is triggeredB . to define a set of actions that occur when a specific user logs in to the systemC . to configure an event action...

September 29, 2018 No Comments READ MORE +

Which two options are the primary deployment models for mobile device management? (Choose two)

Which two options are the primary deployment models for mobile device management? (Choose two)A . Single-siteB . hybrid cloud-basedC . on-permisesD . Cloud basedE . MultisiteView AnswerAnswer: CD Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/BYOD_MDM_Int.pdf

September 28, 2018 No Comments READ MORE +

What is a potential drawback to leaving VLAN 1 as the native VLAN?

What is a potential drawback to leaving VLAN 1 as the native VLAN?A . It may be susceptible  to a VLAN hoping attack.B . Gratuitous ARPs might be able to conduct a man-in-the-middle attack.C . The CAM might be overloaded, effectively turning the switch into a hub.D . VLAN 1...

September 28, 2018 No Comments READ MORE +

Which two features are supported in a VRF-aware software infrastructure before VRF-lite? (Choose two)

Which two features are supported in a VRF-aware software infrastructure before VRF-lite? (Choose two)A . priority queuingB . EIGRPC . multicastD . WCCPE . fair queuingView AnswerAnswer: BC

September 27, 2018 No Comments READ MORE +

What data is transferred during DH for making public and private key?

What data is transferred during DH for making public and private key?A . Random prime IntegerB .  Encrypted data transferC . Diffie-HellmanView AnswerAnswer: A

September 25, 2018 No Comments READ MORE +

Which statements about reflexive access lists are true? (Choose three.)

Which statements about reflexive access lists are true? (Choose three.)A . Reflexive access lists create a permanent ACEB . Reflexive access lists approximate session filtering using the established keywordC . Reflexive access lists can be attached to standard named IP ACLsD . Reflexive access lists support UDP sessionsE . Reflexive...

September 25, 2018 No Comments READ MORE +