Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . url B. terminal C. profile D. selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication mode,...
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist Center B. File Reputation Center C. AMP Reputation Center D. IP and Domain Reputation CenterView AnswerAnswer: D
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission.B . The attack is fragmented into groups of 8 octets before transmission.C . Short synchronized bursts of traffic are used to disrupt TCP connections.D . Malformed...
Which two descriptions of AES encryption are true? (Choose two)
Which two descriptions of AES encryption are true? (Choose two)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)A . configure Active Directory Group Policies to push proxy settingsB . configure policy-based routing on the network infrastructureC . reference a Proxy Auto Config fileD . configure the proxy IP address...
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...
Why would a user choose an on-premises ESA versus the CES solution?
Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsite.B . Demand is unpredictable.C . The server team wants to outsource this service.D . ESA is deployed inline.View AnswerAnswer: A
Which statement about IOS zone-based firewalls is true?
Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D
Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A