Which statement about the authentication protocol used in the configuration is true?

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packet.D . There are separate authentication and...

September 13, 2020 No Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two.)

Which two descriptions of AES encryption are true? (Choose two.)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...

September 13, 2020 No Comments READ MORE +

In which cloud services model is the tenant responsible for virtual machine OS patching?

In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A Explanation: Reference: https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paas­how-microsoft-office-365-azure-fit-in-021672.php

September 12, 2020 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

September 11, 2020 No Comments READ MORE +

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events.B . It provides stateless IP flow tracking that exports all records of a specific flow.C . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...

April 4, 2020 No Comments READ MORE +

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: DE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf

March 30, 2020 No Comments READ MORE +

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)A . SIPB . inline normalizationC . SSLD . packet decoderE . modbusView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config­guide-v60/Application_Layer_Preprocessors.html

March 29, 2020 No Comments READ MORE +

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the management solutionView AnswerAnswer: D

March 28, 2020 1 Comment READ MORE +

What does the number 15 represent in this configuration?

Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible failed attempts...

March 24, 2020 No Comments READ MORE +

Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: B

March 24, 2020 2 Comments READ MORE +