Which option best describes RPL?
Which option best describes RPL?A . RPL stands for Routing over low priority links that use link-state LSAs to determine the best route between two root border routers.B . RPL stands for Routing over low priority links that use distance vector DOGAG to determine the best route between two root...
What are the two different modes in the private AMP cloud can be deployed? (Choose two)
What are the two different modes in the private AMP cloud can be deployed? (Choose two)A . Air Gap ModeB . External ModeC . Internal ModeD . Public modeE . Cloud modeF . Cloud proxy modeView AnswerAnswer: AF
In a Cisco ASA multiple-context mode of operation configuration, what three session types are resource-limited by default when their context is a member of the default class? (Choose three)
In a Cisco ASA multiple-context mode of operation configuration, what three session types are resource-limited by default when their context is a member of the default class? (Choose three)A . SSL VPN sessionsB . TCP sessionsC . IPSec sessionsD . Telnet sessionsE . SSH sessionsF . ASDM sessionsView AnswerAnswer: DEF
Which two design options are best to reduce security concerns when adopting IoT into an organization? (Choose two.)
Which two design options are best to reduce security concerns when adopting IoT into an organization? (Choose two.)A . Encrypt sensor data in transit.B . Implement video analytics on IP cameras.C . Ensure that applications can gather and analyze data at the edge.D . Encrypt data at rest on all...
Which best practice can limit inbound TTL expiry attacks?
Which best practice can limit inbound TTL expiry attacks?A . Setting the TTL value equal to the longest path in the network.B . Setting the TTL value to less than the longest path in the network.C . Setting the TTL value to more than the longest path in the network.D...
Q51.Which satement about SMTP authentication in a Cisco ESA deployment is true?
Q51.Which satement about SMTP authentication in a Cisco ESA deployment is true?A . If an authenticating user belongs to more than on LDAP group, each with different user roles, AsyncOS grants permissions in accordance with the least restrictive user role.B . The LDAP servers used by an ESA must share...
Which option describes how the Umbrella protects your internal endpoints from potentially malicious sites that have not been inspected by Umbrella?
Q61.Your organization signed up for Umbrella Enterprise. Before you deploy Umbrella client, you configured the Umbrella DNS server as forwarders on your enterprise DNS servers to offer basic security services for Internet-Bound traffic. Which option describes how the Umbrella protects your internal endpoints from potentially malicious sites that have not...
What are two types of attacks against wireless networks that can be prevented by a WLC? (choose two)
What are two types of attacks against wireless networks that can be prevented by a WLC? (choose two)A . Layer 3 flooding attacksB . DHCP rogue server attacksC . IP spoofing attacksD . Inverse ARP attacks on specific portsE . ARP sniffing attacks on specific portsView AnswerAnswer: BC
How does a Cisco ISE server determine whether a client supports EAP chaining?
How does a Cisco ISE server determine whether a client supports EAP chaining?A . It sends an Mo5 challenge to the client and analyzes the responseB . It analyzes the options field in the TCP header of the first packet it receives from the clientC . It analyzes the EAPoL...
Within Platform as a Service, which two components are managed by the customer? (Choose two)
Within Platform as a Service, which two components are managed by the customer? (Choose two)A . DataB . NetworkingC . MiddlewareD . ApplicationsE . Operating systemView AnswerAnswer: AD