What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

November 2, 2020 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . URL FilteringC . Impact FlagsD . Health MonitoringView AnswerAnswer: C

November 2, 2020 1 Comment READ MORE +

What is a difference between FlexVPN and DMVPN?

What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C

November 1, 2020 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . bootloaderB . buffer modeC . registryD . virtualE . user modeView AnswerAnswer: AE

November 1, 2020 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . ping of deathB . HTTP floodC . virusD . NTP amplificationView AnswerAnswer: C

November 1, 2020 No Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two)

Which two key and block sizes are valid for AES? (Choose two)A . 128-bit block size, 192-bit key lengthB . 128-bit block size, 256-bit key lengthC . 64-bit block size, 168-bit key lengthD . 192-bit block size, 256-bit key lengthE . 64-bit block size, 112-bit key lengthView AnswerAnswer: AB

November 1, 2020 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

October 31, 2020 No Comments READ MORE +

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and IPv6 configuredB . Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premisesC . Cisco FTDv configured in routed mode and managed by...

October 31, 2020 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)A . Malformed packets are used to crash systems.B . The attack is fragmented into groups of 8 octets before transmission.C . The attack is fragmented into groups of 16 octets before transmission.D . Publicly accessible DNS servers are...

October 30, 2020 No Comments READ MORE +

What action is needed to authenticate the VPN?

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on hostA. B. Enter the command with a...

October 30, 2020 No Comments READ MORE +