What must be configured to accomplish this?
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically. What must be configured to accomplish this?A . Configure the Cisco WSA to...
What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . ip device-trackingB . aaa new-modelC . aaa server radius dynamic-authorD . auth-type allView AnswerAnswer: C
Which algorithm provides asymmetric encryption?
Which algorithm provides asymmetric encryption?A . RC4B . RSAC . AESD . 3DESView AnswerAnswer: B Explanation: https://securityboulevard.com/2020/05/types-of-encryption-5-encryption-algorithms-how-to-choose-the-right-on
Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE . Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: B E
Which two key and block sizes are valid for AES? (Choose two.)
Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C D
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?A . LDAPB . SDPC . subordinate CAD . HTTPE . SCPView AnswerAnswer: A D
How is ICMP used an exfiltration technique?
How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
Which two behavioral patterns characterize a ping of death attack? (Choose two.) A. The attack is fragmented into groups of 16 octets before transmission. B. The attack is fragmented into groups of 8 octets before transmission. C. Short synchronized bursts of traffic are used to disrupt TCP connections. D. Malformed...