Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...

January 26, 2021 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D

January 26, 2021 No Comments READ MORE +

Which product meets all of these requirements?

An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?A . Cisco Prime InfrastructureB . Cisco Identity Services...

January 26, 2021 No Comments READ MORE +

What does the number 15 represent in this configuration?

Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible failed attempts...

January 26, 2021 No Comments READ MORE +

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D

January 26, 2021 No Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two.)

Which two descriptions of AES encryption are true? (Choose two.)A . AES is less secure than 3DESB . AES is more secure than 3DESC . AES can use a 168-bit key for encryption.D . AES can use a 256-bit key for encryption.E . AES encrypts and decrypts a key three...

January 26, 2021 No Comments READ MORE +

Which statement about IOS zone-based firewalls is true?

Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html

January 26, 2021 No Comments READ MORE +

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco StealthwatchView AnswerAnswer: C

January 26, 2021 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A

January 26, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

January 25, 2021 No Comments READ MORE +