What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

March 15, 2024 No Comments READ MORE +

What does the API do when connected to a Cisco security appliance?

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . get the process and PID information from the computers in the networkB . create an SNMP pull mechanism for managing AMPC . gather network telemetry information from AMP for endpointsD . gather the...

March 15, 2024 No Comments READ MORE +

What is a difference between FlexVPN and DMVPN?

What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C

March 15, 2024 No Comments READ MORE +

What action is needed to authenticate the VPN?

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on hostA. B. Enter the command...

March 15, 2024 No Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two)

Which two key and block sizes are valid for AES? (Choose two)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C, D...

March 14, 2024 No Comments READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity? A. DMVPN B. FlexVPN C. IPsec DVTI D. GET VPNView AnswerAnswer: D Explanation: Cisco‘s Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminate...

March 14, 2024 No Comments READ MORE +

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from Managed devices?

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from Managed devices?A . health policyB . system policyC . correlation policyD . access control policyE . health awareness policyView AnswerAnswer: A

March 14, 2024 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

March 14, 2024 No Comments READ MORE +

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)A . Windows serviceB . computer identityC . user identityD . Windows firewallE . default browserView AnswerAnswer: A, D

March 14, 2024 No Comments READ MORE +

What is a characteristic of Firepower NGIPS inline deployment mode?

What is a characteristic of Firepower NGIPS inline deployment mode?A . ASA with Firepower module cannot be deployed.B . It cannot take actions such as blocking traffic.C . It is out-of-band from traffic.D . It must have inline interface pairs configured.View AnswerAnswer: D

March 14, 2024 No Comments READ MORE +