What is a characteristic of a bridge group in ASA Firewall transparent mode?

What is a characteristic of a bridge group in ASA Firewall transparent mode? A. It includes multiple interfaces and access rules between interfaces are customizable B. It is a Layer 3 segment and includes one port and customizable access rules C. It allows ARP traffic with a single access rule...

April 5, 2022 No Comments READ MORE +

What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?

What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?A . The Cisco ASA denies all traffic by default whereas the Cisco IOS router with Zone-Based Policy Firewall starts out by allowing all traffic, even on untrusted interfacesB . The Cisco IOS...

April 4, 2022 No Comments READ MORE +

With which components does a southbound API within a software-defined network architecture communicate?

With which components does a southbound API within a software-defined network architecture communicate?A . controllers within the networkB . applicationsC . appliancesD . devices such as routers and switchesView AnswerAnswer: D Explanation: The Southbound API is used to communicate between Controllers and network devices.

April 4, 2022 No Comments READ MORE +

What is an advantage of network telemetry over SNMP pulls?

What is an advantage of network telemetry over SNMP pulls?A . accuracyB . encapsulationC . securityD . scalabilityView AnswerAnswer: C

April 4, 2022 No Comments READ MORE +

Which attack type attempts to shut down a machine or network so that users are not able to access it?

Which attack type attempts to shut down a machine or network so that users are not able to access it?A . smurfB . bluesnarfingC . MAC spoofingD . IP spoofingView AnswerAnswer: A Explanation: Denial-of-service (DDoS) aims at shutting down a network or service, causing it to be inaccessible to itsintended...

April 4, 2022 No Comments READ MORE +

When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?

When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?A . RSA is an asymmetric key establishment algorithm intended to output symmetric keysB . RSA is a symmetric key establishment algorithm intended to output asymmetric keysC . DH is a symmetric key...

April 3, 2022 No Comments READ MORE +

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?A . when there is a need for traditional anti-malware detectionB . when there is no need to have the solution centrally managedC . when there is no firewall on the networkD . when...

April 3, 2022 No Comments READ MORE +

What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...

April 3, 2022 No Comments READ MORE +

Which type of attack is the device undergoing?

A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?A . phishingB . slowlorisC . pharmingD . SYN floodView AnswerAnswer: D

April 3, 2022 No Comments READ MORE +

What is a benefit of using a multifactor authentication strategy?

What is a benefit of using a multifactor authentication strategy?A . It provides visibility into devices to establish device trust.B . It provides secure remote access for applications.C . It provides an easy, single sign-on experience against multiple applicationsD . It protects data by enabling the use of a second...

April 2, 2022 No Comments READ MORE +