What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use the same hashing algorithms.B . IOS routers run the same NHRP code for DMVPN and FlexVPD . FlexVPN and DMVPN use the new key management protocol.E . FlexVPN and DMVPN use IS-IS routing protocol to communicate...

April 11, 2021 No Comments READ MORE +

Which two cryptographic algorithms are used with IPsec? {Choose two.)

Which two cryptographic algorithms are used with IPsec? {Choose two.)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C E Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-mt/sec-sec-for-vpns-w-ips

April 11, 2021 No Comments READ MORE +

Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.

Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/detecti

April 10, 2021 No Comments READ MORE +

What must be configured, based on a predefined threshold, to address this issue?

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD ....

April 10, 2021 No Comments READ MORE +

What must be used to share data between multiple security products?

What must be used to share data between multiple security products?A . Cisco Stealthwatch CloudB . Cisco Advanced Malware ProtectionC . Cisco Platform Exchange GridD . Cisco Rapid Threat ContainmentView AnswerAnswer: C

April 10, 2021 No Comments READ MORE +

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Vulnerabilities and ExposuresB . Common Exploits and VulnerabilitiesC . Common Security ExploitsD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cve/174/cve-addressed-1741.html

April 10, 2021 No Comments READ MORE +

Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: D

April 10, 2021 No Comments READ MORE +

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . ip device-trackingB . aaa new-modelC . aaa server radius dynamic-authorD . auth-type allView AnswerAnswer: C

April 10, 2021 No Comments READ MORE +

Which Cisco ASA command must be used?

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used? A. flow exporter <name> B. ip flow monitor<name> input C. ip flow-export destination 1.1.1.1 2055 D. flow-export destination inside 1.1.1.1 2055View AnswerAnswer: D

April 10, 2021 No Comments READ MORE +

Which tool should be used to accomplish this goal?

A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?A . Security ManagerB . CloudlockC . Web Security ApplianceD . Cisco ISEView...

April 10, 2021 No Comments READ MORE +