Which command do you use to rule out any configuration issues on the firewall?
Q60.An ASA firewall is deployed at the perimeter to provide NAT for services hosted in the DMZ, one of the service in the DMZ is non-responsive from the Internet. Which command do you use to rule out any configuration issues on the firewall?A . PingB . debug ip nat dynamic...
Which statement about EAP chaining is ture?
Which statement about EAP chaining is ture?A . It performs authentication on a device-only basisB . It requires EAP-FAST authenticationC . It supports RADIUS and TACACS+ authenticationD . It locks a unique certificate to BYOD devices to differentiate them from corporate-owned devicesE . It can be deployed in an agentless...
Which method requires the least effort for all types of endpoints (campus and data center) across the enterprise?
Various methods are available for load-balancing across WSA deployment. Which method requires the least effort for all types of endpoints (campus and data center) across the enterprise?A . Use WPAD that uses the IP address of the WSAs.B . Configure the WSA as an SXP speaker to push static SGT-To-IP...
Which statement about MDM is true?
Which statement about MDM is true?A . Each Cisco ISE node requires its own MDM serverB . It can support endpoints without requiring them to registerC . Cisco ISE communicates with the MOM server by way of REST APl callsD . It reports the IP address of the endpoint to...
Q62.Which option is the only way in a public cloud setup. Such as Microsoft Azure, to provide access the virtual machines that may be running services such as apache or IIS
Q62.Which option is the only way in a public cloud setup. Such as Microsoft Azure, to provide access the virtual machines that may be running services such as apache or IISA . WLCvB . ISEC . WSAvD . ASAvView AnswerAnswer: D
Which authentication does WCCPv2 use to protect messages against interception, inspection, and replay attacks?
Which authentication does WCCPv2 use to protect messages against interception, inspection, and replay attacks?A . MD5B . Cleat textC . Two factorD . KerberosE . EAPView AnswerAnswer: A
Which option is a possible of the issue?
Q66.You deploy two ASAs appliances in Microsoft Azure. Each ASAs protects different subnets with one of the interfaces on each ASA in the same subnet. You enable the EIGRP routing protocol between the two ASAs on the common subnet, so the VMs behind each ASA can communicate with each other,...
Which statement correctly describes TAP mode deployment in IPS?
Which statement correctly describes TAP mode deployment in IPS?A . In TAP mode traffic flow gets disturbed for analysisB . TAP mode is available when ports are configured as passive interfacesC . TAP mode implementation requires SPAN configuration on a switchD . TAP mode is available when IPS is deployed...
Q58.Which process is the most efficient to generate wildcard certificates in ISE and implement them on all nodes?
Q58.Which process is the most efficient to generate wildcard certificates in ISE and implement them on all nodes?A . Generate a CSR for a wildcard certificate on one node, install the received certificate, export it without the private key, and then import it to all the other nodesB . Generate...
Which option is a possible cause of this failure?
Q71.You are troubleshooting a FlexVPN deployment. You find that while the tunnel from the spokes to the hubs are in the “UP” state, communication is still broken. Upon further investigation, you determine that ICMP echo that is initiated from an endpoint in the spoke site is seen by the destination...