Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . url B. terminal C. profile D. selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication mode,...

January 3, 2023 No Comments READ MORE +

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist Center B. File Reputation Center C. AMP Reputation Center D. IP and Domain Reputation CenterView AnswerAnswer: D

January 3, 2023 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...

August 25, 2022 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission.B . The attack is fragmented into groups of 8 octets before transmission.C . Short synchronized bursts of traffic are used to disrupt TCP connections.D . Malformed...

August 25, 2022 No Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two)

Which two descriptions of AES encryption are true? (Choose two)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...

August 25, 2022 No Comments READ MORE +

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)A . configure Active Directory Group Policies to push proxy settingsB . configure policy-based routing on the network infrastructureC . reference a Proxy Auto Config fileD . configure the proxy IP address...

August 25, 2022 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

August 25, 2022 No Comments READ MORE +

Why would a user choose an on-premises ESA versus the CES solution?

Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsite.B . Demand is unpredictable.C . The server team wants to outsource this service.D . ESA is deployed inline.View AnswerAnswer: A

August 25, 2022 No Comments READ MORE +

Which statement about IOS zone-based firewalls is true?

Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D

August 25, 2022 No Comments READ MORE +

Which technology is used to improve web traffic performance by proxy caching?

Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A

August 24, 2022 No Comments READ MORE +