Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . RSAC . DESD . AESView AnswerAnswer: B

January 25, 2021 No Comments READ MORE +

Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: D Explanation: Use the show authentication sessions command to display...

January 25, 2021 No Comments READ MORE +

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two.)

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two.)A . Sophos engineB . white listC . RATD . outbreak filtersE . DLPView AnswerAnswer: AD

January 25, 2021 No Comments READ MORE +

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist CenterB . File Reputation CenterC . AMP Reputation CenterD . IP and Domain Reputation CenterView AnswerAnswer: D

January 25, 2021 No Comments READ MORE +

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application ControlB . Security Category BlockingC . Content Category BlockingD . File AnalysisView AnswerAnswer: B

January 24, 2021 No Comments READ MORE +

Which functions of an SDN architecture require southbound APIs to enable communication?

Which functions of an SDN architecture require southbound APIs to enable communication?A . SDN controller and the network elementsB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the cloudView AnswerAnswer: A

January 24, 2021 No Comments READ MORE +

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)A . accountingB . assuranceC . automationD . authenticationE . encryptionView AnswerAnswer: B,C Topic 2, Exam Pool B

January 24, 2021 No Comments READ MORE +

Which RADIUS attribute can you use to filter MAB requests in an 802.1x deployment?

Which RADIUS attribute can you use to filter MAB requests in an 802.1x deployment?A . 1B . 6C . 31D . 2View AnswerAnswer: B

January 24, 2021 No Comments READ MORE +

Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/products/collateral/routers/asr-1000-series-aggregation-servicesrouters/data_sheet_c78-704277.html

January 24, 2021 No Comments READ MORE +

Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.

Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services. View AnswerAnswer:

January 24, 2021 No Comments READ MORE +