What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: B E
Which two key and block sizes are valid for AES? (Choose two.)
Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C D
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?A . LDAPB . SDPC . subordinate CAD . HTTPE . SCPView AnswerAnswer: A D
How is ICMP used an exfiltration technique?
How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
Which two behavioral patterns characterize a ping of death attack? (Choose two.) A. The attack is fragmented into groups of 16 octets before transmission. B. The attack is fragmented into groups of 8 octets before transmission. C. Short synchronized bursts of traffic are used to disrupt TCP connections. D. Malformed...
Which attack is commonly associated with C and C++ programming languages?
Which attack is commonly associated with C and C++ programming languages? A. cross-site scripting B. water holing C. DDoS D. buffer overflowView AnswerAnswer: D Explanation: https://en.wikipediA.org/wiki/Buffer_overflow
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?A . show authorization statusB . show authen sess int gi0/1C . show connection status gi0/1D . show ver gi0/1View AnswerAnswer: B
What provides visibility and awareness into what is currently occurring on the network?
What provides visibility and awareness into what is currently occurring on the network?A . CMXB . WMIC . Prime InfrastructureD . TelemetryView AnswerAnswer: D
On which part of the IT environment does DevSecOps focus?
On which part of the IT environment does DevSecOps focus?A . application developmentB . wireless networkC . data centerD . perimeter networkView AnswerAnswer: A
Which two features of Cisco Email Security can protect your organization against email threats?(choose two)
Which two features of Cisco Email Security can protect your organization against email threats?(choose two)A . Time-based one-time passwordsB . Data loss preventionC . Heuristic-based filteringD . Geolocation-based filteringE . NetFlowView AnswerAnswer: BD