Which port configuration is missing?

Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate . Which port configuration is missing?A . authentication openB . dotlx reauthenticationC . cisp enableD . dot1x pae authenticatorView AnswerAnswer: D

June 21, 2022 No Comments READ MORE +

Which ASA deployment mode can provide separation of management on a shared appliance?

Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone modeB . transparent firewall modeC . multiple context modeD . routed modeView AnswerAnswer: C

June 21, 2022 No Comments READ MORE +

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?A . interpacket variationB . software package variationC . flow insight variationD . process details variationView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/global/en_uk/products/switches/cisco_nexus_9300_ex_platform_switches_white_paper_uki.pdf

June 21, 2022 No Comments READ MORE +

Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?

Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile.B . It defines a traffic baseline for traffic anomaly deduction.C . It inspects hosts that meet the profile with more intrusion rules.D . It blocks...

June 21, 2022 No Comments READ MORE +

Which two mechanisms are used to control phishing attacks? (Choose two)

Which two mechanisms are used to control phishing attacks? (Choose two)A . Enable browser alerts for fraudulent websites.B . Define security group memberships.C . Revoke expired CRL of the websites.D . Use antispyware software.E . Implement email filtering techniques.View AnswerAnswer: A,E

June 20, 2022 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D

June 20, 2022 No Comments READ MORE +

Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?

Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?A . 1B . 2C . 6D . 31View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networkingservices/config_guide_c17-663759.html

June 20, 2022 No Comments READ MORE +

What is the function of the Context Directory Agent?

What is the function of the Context Directory Agent?A . maintains users’ group membershipsB . relays user authentication requests from Web Security Appliance to Active DirectoryC . reads the Active Directory logs to map IP addresses to usernamesD . accepts user authentication requests on behalf of Web Security Appliance for...

June 20, 2022 No Comments READ MORE +

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)A . Enable NetFlow Version 9.B . Create an ACL to allow UDP traffic on port 9996.C . Apply NetFlow Exporter to the outside interface in the inbound direction.D . Create a class map to match interesting...

June 20, 2022 No Comments READ MORE +

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)A . configure Active Directory Group Policies to push proxy settingsB . configure policy-based routing on the network infrastructureC . reference a Proxy Auto Config fileD . configure the proxy IP address...

June 19, 2022 No Comments READ MORE +