encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DES B. RSA C. DES D. AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation,as well...
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inlineposture node?
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inlineposture node?A . RADIUS Change of Authorization B. device tracking C. DHCP snooping D. VLAN hoppingView AnswerAnswer: A
What are two rootkit types? (Choose two)
What are two rootkit types? (Choose two)A . registry B. virtual C. bootloader D. user mode E. buffer modeView AnswerAnswer: C, D Explanation: The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with thehighest possible level of access privileges, similar...
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)A . Enable NetFlow Version 9. B. Create an ACL to allow UDP traffic on port 9996. C. Apply NetFlow Exporter to the outside interface in the inbound direction. D. Create a class map to match interesting...
System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . Correlation B. Intrusion C. Access Control D. Network DiscoveryView AnswerAnswer: D Explanation: The Firepower System uses network discovery and identity policies to collect host, application, and user data for traffic on your...
What is the primary benefit of deploying an ESA in hybrid mode?
What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environment B. It provides the lowest total cost of ownership by reducing the need for physical appliances C. It provides maximum...
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services?
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor auth B. local web auth C. single sign-on D. central web auth E. TACACS+View AnswerAnswer: B, D
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX C. authenticates the IKEv1 peers in the 172.16.0.0/16...
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig command B. Configure the advancedproxyconfig command with the HTTPS subcommand C. Configure a small log-entry size. D. Configure a maximum packet size.View AnswerAnswer: B
Which option is the main function of Cisco Firepower impact flags?
Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur. B. They highlight known and suspected malicious IP addresses in reports. C. They correlate data about intrusions and vulnerability. D. They identify data that the ASA sends to the Firepower module.View...