What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: B E

March 13, 2021 No Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two.)

Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C D

March 12, 2021 No Comments READ MORE +

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?A . LDAPB . SDPC . subordinate CAD . HTTPE . SCPView AnswerAnswer: A D

March 12, 2021 No Comments READ MORE +

How is ICMP used an exfiltration technique?

How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...

March 12, 2021 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

Which two behavioral patterns characterize a ping of death attack? (Choose two.) A. The attack is fragmented into groups of 16 octets before transmission. B. The attack is fragmented into groups of 8 octets before transmission. C. Short synchronized bursts of traffic are used to disrupt TCP connections. D. Malformed...

February 5, 2021 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages? A. cross-site scripting B. water holing C. DDoS D. buffer overflowView AnswerAnswer: D Explanation: https://en.wikipediA.org/wiki/Buffer_overflow

February 5, 2021 No Comments READ MORE +

What Cisco command shows you the status of an 802.1X connection on interface gi0/1?

What Cisco command shows you the status of an 802.1X connection on interface gi0/1?A . show authorization statusB . show authen sess int gi0/1C . show connection status gi0/1D . show ver gi0/1View AnswerAnswer: B

February 5, 2021 No Comments READ MORE +

What provides visibility and awareness into what is currently occurring on the network?

What provides visibility and awareness into what is currently occurring on the network?A . CMXB . WMIC . Prime InfrastructureD . TelemetryView AnswerAnswer: D

February 5, 2021 No Comments READ MORE +

On which part of the IT environment does DevSecOps focus?

On which part of the IT environment does DevSecOps focus?A . application developmentB . wireless networkC . data centerD . perimeter networkView AnswerAnswer: A

February 5, 2021 No Comments READ MORE +

Which two features of Cisco Email Security can protect your organization against email threats?(choose two)

Which two features of Cisco Email Security can protect your organization against email threats?(choose two)A . Time-based one-time passwordsB . Data loss preventionC . Heuristic-based filteringD . Geolocation-based filteringE . NetFlowView AnswerAnswer: BD

February 5, 2021 No Comments READ MORE +