Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...

March 14, 2020 No Comments READ MORE +

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a­glance-c45-736555.pdf

March 13, 2020 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...

March 13, 2020 2 Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two.)

Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: CD Explanation:...

March 13, 2020 No Comments READ MORE +

Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right

DRAG DROP Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config­guide-v64/detecting_specific_threats.html

March 13, 2020 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

March 12, 2020 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A

March 12, 2020 No Comments READ MORE +

Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)A . phishingB . brute forceC . man-in-the-middleD . DDOSE . tear dropView AnswerAnswer: BC

March 12, 2020 3 Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D

March 12, 2020 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . security intelligenceB . impact flagsC . health monitoringD . URL filteringView AnswerAnswer: A

March 12, 2020 3 Comments READ MORE +