Which statement about IOS zone-based firewalls is true?

Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zoneC . An interface can be assigned to multiple zonesD . An interface can be assigned only to one zoneView AnswerAnswer: D

January 27, 2021 No Comments READ MORE +

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?A . SNMPB . SMTPC . syslogD . model-driven telemetryView AnswerAnswer: D

January 27, 2021 No Comments READ MORE +

Which list contains the allowed recipient addresses?

An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?A . SATB . BATC . HATD . RATView AnswerAnswer: D

January 27, 2021 No Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two.)

Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C,D

January 27, 2021 1 Comment READ MORE +

Which command enables 802.1X globally on a Cisco switch?

Which command enables 802.1X globally on a Cisco switch?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . aaa new-modelView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/routers/nfvis/switch_command/b-nfvis-switch-commandreference/802_1x_commands.html

January 27, 2021 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...

January 26, 2021 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D

January 26, 2021 No Comments READ MORE +

Which product meets all of these requirements?

An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?A . Cisco Prime InfrastructureB . Cisco Identity Services...

January 26, 2021 No Comments READ MORE +

What does the number 15 represent in this configuration?

Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible failed attempts...

January 26, 2021 No Comments READ MORE +

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D

January 26, 2021 No Comments READ MORE +