Which two descriptions of AES encryption are true? (Choose two.)
Which two descriptions of AES encryption are true? (Choose two.)A . AES is less secure than 3DESB . AES is more secure than 3DESC . AES can use a 168-bit key for encryption.D . AES can use a 256-bit key for encryption.E . AES encrypts and decrypts a key three...
Which statement about IOS zone-based firewalls is true?
Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco StealthwatchView AnswerAnswer: C
Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)A . computer identityB . Windows serviceC . user identityD . Windows firewallE . default browserView AnswerAnswer: B,D
What two catalyst switch security features will prevent further violations?
A malicious user gained network access by spoofing printer connections that were authorized using MAB on four different switch ports at the same time. What two catalyst switch security features will prevent further violations? (Choose two)A . DHCP SnoopingB . 802.1AE MacSecC . Port securityD . IP Device trackingE ....
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?A . weak...
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...