Which technology must be used to implement secure VPN connectivity among company branches over aprivate IP cloud with any-to-any scalable connectivity?
Which technology must be used to implement secure VPN connectivity among company branches over aprivate IP cloud with any-to-any scalable connectivity? A. DMVPN B. FlexVPN C. IPsec DVTI D. GET VPNView AnswerAnswer: D Explanation: Cisco‘s Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminatepoint-to-point tunnels...
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; theIPsec configuration is copied automatically B. The active and standby devices can run different versions of the Cisco...
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile. B. It defines a traffic baseline for traffic anomaly deduction. C. It inspects hosts that meet the profile with more intrusion rules. D. It blocks...
Which attack is commonly associated with C and C++ programming languages?
Which attack is commonly associated with C and C++ programming languages?A . cross-site scripting B. water holing C. DDoS D. buffer overflowView AnswerAnswer: D Explanation: A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program...
Which list contains the allowed recipient addresses?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to arecipient address. Which list contains the allowed recipient addresses?A . SAT B. BAT C. HAT D. RATView AnswerAnswer: D
What is a characteristic of traffic storm control behavior?
What is a characteristic of traffic storm control behavior?A . Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level withinthe interval. B. Traffic storm control cannot determine if the packet is unicast or broadcast. C. Traffic storm control monitors incoming traffic levels over...
What is a language format designed to exchange threat intelligence that can be transported over the TAXIIprotocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXIIprotocol?A . STIX B. XMPP C. pxGrid D. SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?A . It allows the endpoint to authenticate with 802.1x or MAB. B. It verifies that the endpoint has the latest Microsoft security patches installed. C. It adds endpoints to identity groups...
What does the API do when connected to a Cisco security appliance?
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . get the process and PID information from the computers in the network B. create an SNMP pull mechanism for managing AMP C. gather network telemetry information from AMP for endpoints D. gather the...
Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . url B. terminal C. profile D. selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication mode,...