Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html
Which command enables 802.1X globally on a Cisco switch?
Which command enables 802.1X globally on a Cisco switch?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . aaa new-modelView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/routers/nfvis/switch_command/b-nfvis-switch-commandreference/802_1x_commands.html
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . group policyB . access control policyC . device management policyD . platform service policyView AnswerAnswer: D Explanation: Reference:...
Which two descriptions of AES encryption are true? (Choose two.)
Which two descriptions of AES encryption are true? (Choose two.)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...
What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirected.B . Traffic from the inside network is redirected.C . All TCP traffic is redirected.D . Traffic from the inside and DMZ networks is redirected.View AnswerAnswer: D
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?A . SNMPB . SMTPC . syslogD . model-driven telemetryView AnswerAnswer: D Explanation: Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C
Which list contains the allowed recipient addresses?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?A . SATB . BATC . HATD . RATView AnswerAnswer: D