Which two fields are defined in the NetFlow flow? (Choose two)

Which two fields are defined in the NetFlow flow? (Choose two)A . type of service byteB . class of service bitsC . Layer 4 protocol typeD . destination portE . output logical interfaceView AnswerAnswer: A,D Explanation: Cisco standard NetFlow version 5 defines a flow as a unidirectional sequence of packets...

May 31, 2022 No Comments READ MORE +

Which action controls the amount of URI text that is stored in Cisco WSA logs files?

Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig commandB . Configure the advancedproxyconfig command with the HTTPS subcommandC . Configure a small log-entry size.D . Configure a maximum packet size.View AnswerAnswer: B

May 31, 2022 No Comments READ MORE +

Which command achieves this goal?

A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1 . Which command achieves this goal?A . snmp-server host inside 10.255.254.1 version 3 andyB . snmp-server host inside 10.255.254.1 version 3...

May 30, 2022 No Comments READ MORE +

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf

May 30, 2022 No Comments READ MORE +

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: A,D Explanation: Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html The two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint, face, and...

May 30, 2022 No Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two)

Which two descriptions of AES encryption are true? (Choose two)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...

May 30, 2022 No Comments READ MORE +

Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)

Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . PortB . RuleC . SourceD . ApplicationE . ProtocolView AnswerAnswer: B,C

May 30, 2022 No Comments READ MORE +

What is a difference between FlexVPN and DMVPN?

What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C

May 30, 2022 No Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D

May 30, 2022 No Comments READ MORE +

What action would allow the attacker to gain access to machine 1 but not machine 2?

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows . What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending...

May 29, 2022 No Comments READ MORE +