Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . multiple context modeB . user deployment of Layer 3 networksC . IPv6D . clusteringView AnswerAnswer: B Explanation: The ASAv on AWS supports the following features: + Support for Amazon EC2 C5 instances, the next generation of the...

March 24, 2024 No Comments READ MORE +

Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?

Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?A . configure system add <host><key>B . configure manager <key> add hostC . configure manager deleteD . configure manager add <host><keyView AnswerAnswer: D

March 24, 2024 No Comments READ MORE +

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?A . RSA SecureIDB . Internal DatabaseC . Active DirectoryD . LDAPView AnswerAnswer: C

March 24, 2024 No Comments READ MORE +

What is a characteristic of Dynamic ARP Inspection?

What is a characteristic of Dynamic ARP Inspection?A . DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.B . In a typical network, make all ports as trusted except for the ports connecting to switches, which Are...

March 24, 2024 No Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor authB . local web authC . single sign-onD . central web authE . TACACS+View AnswerAnswer: B, D

March 23, 2024 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D Explanation: DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based. Therefore DTLS offers strongest throughput performance. The throughput...

March 23, 2024 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

March 23, 2024 No Comments READ MORE +

What is a characteristic of traffic storm control behavior?

What is a characteristic of traffic storm control behavior?A . Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.B . Traffic storm control cannot determine if the packet is unicast or broadcast.C . Traffic storm control monitors incoming traffic levels...

March 23, 2024 No Comments READ MORE +

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . CorrelationB . IntrusionC . Access ControlD . Network DiscoveryView AnswerAnswer: D Explanation: The Firepower System uses network discovery and identity policies to collect host, application, and user data for traffic on your...

March 23, 2024 No Comments READ MORE +

Which two solutions mitigate the risk of this ransom ware infection?

An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransom ware infection? (Choose two)A . Configure a posture policy in Cisco Identity Services...

March 23, 2024 No Comments READ MORE +