Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . ProtocolB . SourceC . PortD . ApplicationE . RuleView AnswerAnswer: BE
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . web page imagesB . databaseC . Linux and Windows operating systemsD . user input validation in a web page or web applicationView AnswerAnswer: D
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and IPv6 configuredB . Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premisesC . Cisco FTDv configured in routed mode and managed by...
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the cloudC . management console and the SDN controllerD . SDN controller and the management solutionView AnswerAnswer: D
What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is...
What is the problem according to this command output?
Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...
What are two rootkit types? (Choose two)
What are two rootkit types? (Choose two)A . bootloaderB . buffer modeC . registryD . virtualE . user modeView AnswerAnswer: A
Which API is used for Content Security?
Which API is used for Content Security?A . OpenVuln APIB . IOS XR APIC . NX-OS APID . AsyncOS APIView AnswerAnswer: D
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . profileB . urlC . terminalD . selfsignedView AnswerAnswer: A