Which two descriptions of AES encryption are true? (Choose two)
Which two descriptions of AES encryption are true? (Choose two)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . PortB . RuleC . SourceD . ApplicationE . ProtocolView AnswerAnswer: B,C
What is a difference between FlexVPN and DMVPN?
What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D
What action would allow the attacker to gain access to machine 1 but not machine 2?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows . What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending...
Which Cisco ASA command must be used?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA . Which Cisco ASA command must be used? A. flow-export destination inside 1.1.1.1 2055 B. ip flow monitor input C. ip flow-export destination 1.1.1.1 2055 D. flow exporterView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_nsel.html
Which outbreak control method is used to accomplish this task?
An engineer is configuring AMP for endpoints and wants to block certain files from executing . Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . RSAC . DESD . AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation, as...
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?A . Advanced Malware ProtectionB . Platform Exchange GridC . Multifactor Platform IntegrationD . Firepower Threat DefenseView AnswerAnswer: B Explanation: With Cisco...
Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/security-book/security-overview.html