Which two fields are defined in the NetFlow flow? (Choose two)
Which two fields are defined in the NetFlow flow? (Choose two)A . type of service byteB . class of service bitsC . Layer 4 protocol typeD . destination portE . output logical interfaceView AnswerAnswer: A,D Explanation: Cisco standard NetFlow version 5 defines a flow as a unidirectional sequence of packets...
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig commandB . Configure the advancedproxyconfig command with the HTTPS subcommandC . Configure a small log-entry size.D . Configure a maximum packet size.View AnswerAnswer: B
Which command achieves this goal?
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1 . Which command achieves this goal?A . snmp-server host inside 10.255.254.1 version 3 andyB . snmp-server host inside 10.255.254.1 version 3...
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: A,D Explanation: Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html The two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint, face, and...
Which two descriptions of AES encryption are true? (Choose two)
Which two descriptions of AES encryption are true? (Choose two)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . PortB . RuleC . SourceD . ApplicationE . ProtocolView AnswerAnswer: B,C
What is a difference between FlexVPN and DMVPN?
What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D
What action would allow the attacker to gain access to machine 1 but not machine 2?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows . What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending...