What is a commonality between DMVPN and FlexVPN technologies?
What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use the same hashing algorithms.B . IOS routers run the same NHRP code for DMVPN and FlexVPD . FlexVPN and DMVPN use the new key management protocol.E . FlexVPN and DMVPN use IS-IS routing protocol to communicate...
Which two cryptographic algorithms are used with IPsec? {Choose two.)
Which two cryptographic algorithms are used with IPsec? {Choose two.)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C E Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-mt/sec-sec-for-vpns-w-ips
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/detecti
What must be configured, based on a predefined threshold, to address this issue?
An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD ....
What must be used to share data between multiple security products?
What must be used to share data between multiple security products?A . Cisco Stealthwatch CloudB . Cisco Advanced Malware ProtectionC . Cisco Platform Exchange GridD . Cisco Rapid Threat ContainmentView AnswerAnswer: C
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Vulnerabilities and ExposuresB . Common Exploits and VulnerabilitiesC . Common Security ExploitsD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cve/174/cve-addressed-1741.html
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: D
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . ip device-trackingB . aaa new-modelC . aaa server radius dynamic-authorD . auth-type allView AnswerAnswer: C
Which Cisco ASA command must be used?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used? A. flow exporter <name> B. ip flow monitor<name> input C. ip flow-export destination 1.1.1.1 2055 D. flow-export destination inside 1.1.1.1 2055View AnswerAnswer: D
Which tool should be used to accomplish this goal?
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?A . Security ManagerB . CloudlockC . Web Security ApplianceD . Cisco ISEView...