What is a difference between Flex VPN and DMVPN?

What is a difference between Flex VPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, Flex VPN only uses IKEv1B . DMVPN uses only IKEv1 Flex VPN uses only IKEv2C . Flex VPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . Flex VPN uses IKEv1 or IKEv2, DMVPN uses only...

November 4, 2021 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)A . Malformed packets are used to crash systems.B . The attack is fragmented into groups of 8 octets before transmission.C . The attack is fragmented into groups of 16 octets before transmission.D . Publicly accessible DNS servers are...

November 3, 2021 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . encryption methodB . username and passwordC . device serial numberD . registration keyView AnswerAnswer: D

November 3, 2021 No Comments READ MORE +

Which two preventive measures are used to control cross-site scripting? (Choose two)

Which two preventive measures are used to control cross-site scripting? (Choose two)A . Disable cookie inspection in the HTML inspection engineB . Incorporate contextual output encoding/escapingC . Enable client-side scripts on a per-domain basisD . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...

November 3, 2021 No Comments READ MORE +

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . time synchronizationB . network address translationsC . quality of serviceD . intrusion policyView AnswerAnswer: A

November 3, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

November 2, 2021 No Comments READ MORE +

What does the API do when connected to a Cisco security appliance?

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . create an SNMP pull mechanism for managing AMPB . gather network telemetry information from AMP for endpointsC . get the process and PID information from the computers in the networkD . gather the...

November 2, 2021 No Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two)

Which two key and block sizes are valid for AES? (Choose two)A . 128-bit block size, 192-bit key lengthB . 128-bit block size, 256-bit key lengthC . 64-bit block size, 168-bit key lengthD . 192-bit block size, 256-bit key lengthE . 64-bit block size, 112-bit key lengthView AnswerAnswer: AB

November 2, 2021 No Comments READ MORE +

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC

November 1, 2021 No Comments READ MORE +

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . pushB . optionsC . connectD . putE . getView AnswerAnswer: AD

November 1, 2021 1 Comment READ MORE +