What is the result of this Python script of the Cisco DNA Center API?

Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds authentication to a switchB . adds a switch to Cisco DNA CenterC . receives information about a switchView AnswerAnswer: B

July 24, 2021 No Comments READ MORE +

Which action controls the amount of URI text that is stored in Cisco WSA logs files?

Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig commandB . Configure the advancedproxyconfig command with the HTTPS subcommandC . Configure a small log-entry size.D . Configure a maximum packet size.View AnswerAnswer: B

July 24, 2021 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . virusB . NTP amplificationC . ping of deathD . HTTP floodView AnswerAnswer: A

July 24, 2021 No Comments READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity? A. DMVPN B. FlexVPN C. IPsec DVTI D. GET VPNView AnswerAnswer: D Explanation: Cisco‘s Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminate...

July 24, 2021 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . registryB . virtualC . bootloaderD . user modeE . buffer modeView AnswerAnswer: CD Explanation: The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with the highest possible level of access privileges, similar...

July 24, 2021 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

July 24, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D Explanation: DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based. Therefore DTLS offers strongest throughput performance. The throughput...

July 24, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

July 24, 2021 No Comments READ MORE +

While using Cisco Firepower's Security Intelligence policies, which two criteria is Firepower block based upon? (Choose two)

While using Cisco Firepower's Security Intelligence policies, which two criteria is Firepower block based upon? (Choose two)A . URLsB . port numbersC . protocol IDsD . MAC addressesE . IP addressesView AnswerAnswer: AE

June 1, 2021 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower NGIPS?

Which feature requires a network discovery policy on the Cisco Firepower NGIPS?A . URL filteringB . impact flagsC . health monitoringD . security intelligenceView AnswerAnswer: B

June 1, 2021 No Comments READ MORE +