What must be configured to accomplish this?

An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically. What must be configured to accomplish this?A . Configure the Cisco WSA to...

March 14, 2021 No Comments READ MORE +

What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...

March 14, 2021 No Comments READ MORE +

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . ip device-trackingB . aaa new-modelC . aaa server radius dynamic-authorD . auth-type allView AnswerAnswer: C

March 14, 2021 No Comments READ MORE +

Which algorithm provides asymmetric encryption?

Which algorithm provides asymmetric encryption?A . RC4B . RSAC . AESD . 3DESView AnswerAnswer: B Explanation: https://securityboulevard.com/2020/05/types-of-encryption-5-encryption-algorithms-how-to-choose-the-right-on

March 13, 2021 No Comments READ MORE +

Which CoA type achieves this goal?

An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE . Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C

March 13, 2021 No Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: B E

March 13, 2021 No Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two.)

Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C D

March 12, 2021 No Comments READ MORE +

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?A . LDAPB . SDPC . subordinate CAD . HTTPE . SCPView AnswerAnswer: A D

March 12, 2021 No Comments READ MORE +

How is ICMP used an exfiltration technique?

How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...

March 12, 2021 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

Which two behavioral patterns characterize a ping of death attack? (Choose two.) A. The attack is fragmented into groups of 16 octets before transmission. B. The attack is fragmented into groups of 8 octets before transmission. C. Short synchronized bursts of traffic are used to disrupt TCP connections. D. Malformed...

February 5, 2021 No Comments READ MORE +