What is the purpose of the certificate signing request when adding a new certificate for a server?
What is the purpose of the certificate signing request when adding a new certificate for a server?A . It is the password for the certificate that is needed to install it with.B . It provides the server information so a certificate can be created and signedC . It provides the...
What is the purpose of CA in a PKI?
What is the purpose of CA in a PKI?A . To issue and revoke digital certificatesB . To validate the authenticity of a digital certificateC . To create the private key for a digital certificateD . To certify the ownership of a public key by the named subjectView AnswerAnswer: A...
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
Which parameter is required when configuring a Netflow exporter on a Cisco Router?A . DSCP valueB . Source interfaceC . Exporter nameD . Exporter descriptionView AnswerAnswer: C Explanation: An example of configuring a NetFlow exporter is shown below: flow exporter Exporter destination 192.168.100.22transport udp 2055
Which role is assigned for Cisco FMC?
An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC?A . clientB . serverC . controllerD . publisherView AnswerAnswer: D
What is the difference between Cross-site Scripting and SQL Injection, attacks?
What is the difference between Cross-site Scripting and SQL Injection, attacks?A . Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.B . Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL...
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?A . CNAMEB . MXC . SPFD . DKIMView AnswerAnswer: B
What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.
What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.A . Create NTLM or Kerberos authentication realm and enable transparent user identificationB . Deploy a separate Active Directory agent such as...
Which IETF attribute is supported for the RADIUS CoA feature?
Which IETF attribute is supported for the RADIUS CoA feature?A . 24 StateB . 30 Calling-Station-IDC . 42 Acct-Session-IDD . 81 Message-AuthenticatorView AnswerAnswer: A
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
Which factor must be considered when choosing the on-premise solution over the cloud-based one?A . With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for itB . With a cloud-based solution, the provider is...
Which Cisco WSA feature supports access control using URL categories?
Which Cisco WSA feature supports access control using URL categories?A . transparent user identificationB . SOCKS proxy servicesC . web usage controlsD . user session restrictionsView AnswerAnswer: A