What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?A . Multiple NetFlow collectors are supported.B . Advanced NetFlow v9 templates and legacy v5 formatting are supported.C . Flow-create events are delayed.D . Secure NetFlow connections are optimized for Cisco Prime InfrastructureView AnswerAnswer: A

January 15, 2021 No Comments READ MORE +

What is a characteristic of traffic storm control behavior?

What is a characteristic of traffic storm control behavior?A . Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the intervalB . Traffic storm control cannot determine if the packet is unicast or broadcastC . Traffic storm control monitors incoming traffic levels...

January 14, 2021 No Comments READ MORE +

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied eventsB . It provides stateless IP flow tracking that exports all records of a specific flowC . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...

January 14, 2021 No Comments READ MORE +

Drag and drop the descriptions from the left onto the encryption algorithms on the right

DRAG DROP Drag and drop the descriptions from the left onto the encryption algorithms on the right. View AnswerAnswer:

January 14, 2021 No Comments READ MORE +

What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

January 14, 2021 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

January 13, 2021 No Comments READ MORE +

What is provided by the Secure Hash Algorithm in a VPN?

What is provided by the Secure Hash Algorithm in a VPN?A . integrityB . key exchangeC . encryptionD . authenticationView AnswerAnswer: B

January 13, 2021 1 Comment READ MORE +

Which two preventive measures are used to control cross-site scripting? (Choose two.)

Which two preventive measures are used to control cross-site scripting? (Choose two.)A . Enable client-side scripts on a per-domain basisB . Incorporate contextual output encoding/escapingC . Disable cookie inspection in the HTML inspection engineD . Run untrusted HTML input through an HTML sanitization engineE . SameSite cookie attribute should not...

January 13, 2021 No Comments READ MORE +

Refer to the exhibit.

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is trueA . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packetD . There are separate authentication and...

January 13, 2021 No Comments READ MORE +

What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is...

November 10, 2020 No Comments READ MORE +