Which policy do you conifigure on a Firepower System to mitigate these effects?

Q56.A perimeter firewall can rendered completely useless when limited or no DDOS protection is proviede. However, the effects can be mitigated if a firewall is tuned to manage the load more efficiently. Which policy do you conifigure on a Firepower System to mitigate these effects?A . SSLB . intrusionC ....

July 25, 2018 No Comments READ MORE +

Which three statements about the keying methods used by MACSec are true? (Choose three)

Which three statements about the keying methods used by MACSec are true? (Choose three)A . SAP is not supported on switch SVIsB . SAP is supported on SPAN destination portsC . MKA is implemented as an EAPoL packet exchangeD . Key management for host-to-switch and switch-to-switch MACSec sessions is provided...

July 17, 2018 No Comments READ MORE +

What are the three configurations in which SSL VPN can be implemented? (Choose three)

What are the three configurations in which SSL VPN can be implemented? (Choose three)A . L2TP over IPSecB . WebVPNC . Interactive modeD . PVC Tunnel ModeE . ClientlessF . CHAPG . Thin-ClientH . AnyConnect Tunnel modeView AnswerAnswer: EGH

July 11, 2018 No Comments READ MORE +

With which method or tool do you start your discovery process?

Q59.Your manager asks you to roughly determine the devices and their operating system that are connected to a certain subnet in your enterprise environment. With which method or tool do you start your discovery process?A . ICMPB . WiresharkC . NMAPD . DNS ServerE . Use your network infrastructure (Switches,...

July 5, 2018 No Comments READ MORE +

What are the three scanning engines that the Cisco IronPort dynamic vectoring and streaming engine can use to protect against malware? (Choose three)

What are the three scanning engines that the Cisco IronPort dynamic vectoring and streaming engine can use to protect against malware? (Choose three)A . WebrootB . TrendMicroC . SymantecD . F-SecureE . McAfeeF . SophosView AnswerAnswer: AEF

June 29, 2018 No Comments READ MORE +

Which two statements about the MACsec security protocol are true? (Choose two.)

Which two statements about the MACsec security protocol are true? (Choose two.)A . Stations broadcast an MKA heartbeat that contains the key server priority.B . MACsec is not supported in MDA mode.C . When switch-to-swltch link security is configured In manual mode, the SAP operation mode must be set to...

June 29, 2018 No Comments READ MORE +

What cloud be the possible issue?

Refer to the exhibit. A customer has opened a case with Cisco TAC reporting an issue that one of the Windows client supposed to logion to the network using MAB is no longer able to access any allowed resources. Looking at the configuration of the switch. What cloud be the...

June 28, 2018 No Comments READ MORE +

Which statement correctly describes 3DES encryption algorithm?

Which statement correctly describes 3DES encryption algorithm?A . It is a block cipher algorithm but weaker then DES due to smaller key size.B . It is an asymmetric algorithm with a key size of 168 bits.C . It does decryption in reverse order with the same set of keys used...

June 26, 2018 No Comments READ MORE +

What would be the possible cause of this failure?

Refer to the exhibit. One of the Windows machines in your network is having connectivity issue by using 802.1X. Windows machines are setup to acquire an IP address from DHCP server configured on the switch, which is supposed to hand out IP address from 50.1.1.0/24 network, and forward AAA requests...

June 25, 2018 No Comments READ MORE +

What would be the possible cause of this failure?

Refer to the exhibit. One of the Windows machines in your network is having connectivity issue by using 802.1X. Windows machines are setup to acquire an IP address from DHCP server configured on the switch, which is supposed to hand out IP address from 50.1.1.0/24 network, and forward AAA requests...

June 22, 2018 No Comments READ MORE +