Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . SHA-96B . SHA-384C . AES-GCMD . AES-256View AnswerAnswer: C

November 6, 2020 No Comments READ MORE +

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . routed modeB . active modeC . transparent modeD . inline modeE . passive monitor-only modeView AnswerAnswer: DE

November 6, 2020 5 Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two)

Which two descriptions of AES encryption are true? (Choose two)A . AES is more secure than 3DEC . AES can use a 168-bit key for encryption.D . AES can use a 256-bit key for encryption.E . AES encrypts and decrypts a key three times in sequence.F . AES is less...

November 6, 2020 2 Comments READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D

November 6, 2020 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . web page imagesB . databaseC . Linux and Windows operating systemsD . user input validation in a web page or web applicationView AnswerAnswer: D

November 5, 2020 2 Comments READ MORE +

Which form of attack is launched using botnets?

Which form of attack is launched using botnets?A . DDOSB . EIDDOSC . TCP floodD . virusView AnswerAnswer: A

November 5, 2020 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Secure the connection between the web and the app tier.B . Use prepared statements and parameterized queries.C . Check integer, float, or Boolean string parameters to ensure accurate values.D . Block SQL code execution in the...

November 5, 2020 No Comments READ MORE +

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . protectB . malwareC . URL filteringD . controlView AnswerAnswer: A

November 4, 2020 No Comments READ MORE +

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the cloudC . management console and the SDN controllerD . SDN controller and the management solutionView AnswerAnswer: D

November 3, 2020 No Comments READ MORE +

Which two mechanisms are used to control phishing attacks? (Choose two)

Which two mechanisms are used to control phishing attacks? (Choose two)A . Use antispyware software.wrongB . Implement email filtering techniques.C . Revoke expired CRL of the websites.D . Enable browser alerts for fraudulent websites.E . Define security group memberships.View AnswerAnswer: BD

November 3, 2020 No Comments READ MORE +