ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A
Which task can you perform to determine where each message was lost?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking.B . Generate a system report.C . Review the log files.D ....
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the management solutionView AnswerAnswer: D
Which type of attack is social engineering?
Which type of attack is social engineering?A . trojanB . phishingC . malwareD . MITMView AnswerAnswer: B Explanation: Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal,often financial, information. Attackers may send email seemingly from a reputable credit card company or...
What is a difference between FlexVPN and DMVPN?
What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C
What is the result of this Python script of the Cisco DNA Center API?
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds authentication to a switchB . adds a switch to Cisco DNA CenterC . receives information about a switchView AnswerAnswer: B
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engineB . white listC . RATD . outbreak filtersE . DLPView AnswerAnswer: A, D