Which two key and block sizes are valid for AES? (Choose two)
Which two key and block sizes are valid for AES? (Choose two)A . 128-bit block size, 192-bit key lengthB . 128-bit block size, 256-bit key lengthC . 64-bit block size, 168-bit key lengthD . 192-bit block size, 256-bit key lengthE . 64-bit block size, 112-bit key lengthView AnswerAnswer: AB
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and IPv6 configuredB . Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premisesC . Cisco FTDv configured in routed mode and managed by...
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which two behavioral patterns characterize a ping of death attack? (Choose two)A . Malformed packets are used to crash systems.B . The attack is fragmented into groups of 8 octets before transmission.C . The attack is fragmented into groups of 16 octets before transmission.D . Publicly accessible DNS servers are...
What action is needed to authenticate the VPN?
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on hostA. B. Enter the command with a...
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . user deployment of Layer 3 networksB . multiple context modeC . clusteringD . IPv6View AnswerAnswer: A
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . time synchronizationB . network address translationsC . quality of serviceD . intrusion policyView AnswerAnswer: A
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . ProtocolB . SourceC . PortD . ApplicationE . RuleView AnswerAnswer: BE
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . pushB . optionsC . connectD . putE . getView AnswerAnswer: DE
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . DESC . RSAD . AESView AnswerAnswer: C