Which Cisco ASA command must be used?

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA . Which Cisco ASA command must be used? A. flow-export destination inside 1.1.1.1 2055 B. ip flow monitor input C. ip flow-export destination 1.1.1.1 2055 D. flow exporterView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_nsel.html

May 29, 2022 No Comments READ MORE +

Which outbreak control method is used to accomplish this task?

An engineer is configuring AMP for endpoints and wants to block certain files from executing . Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C

May 29, 2022 No Comments READ MORE +

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . RSAC . DESD . AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation, as...

May 28, 2022 No Comments READ MORE +

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?A . Advanced Malware ProtectionB . Platform Exchange GridC . Multifactor Platform IntegrationD . Firepower Threat DefenseView AnswerAnswer: B Explanation: With Cisco...

May 28, 2022 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/security-book/security-overview.html

May 28, 2022 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

May 28, 2022 No Comments READ MORE +

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Security ExploitsB . Common Vulnerabilities and ExposuresC . Common Exploits and VulnerabilitiesD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: B Explanation: Reference: CCNP And CCIE Security Core SCOR...

May 27, 2022 No Comments READ MORE +

Which probe must be enabled for this type of profiling to work?

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group . Which probe must be enabled for this type of profiling to work?A . NetFlowB . NMAPC . SNMPD . DHCPView AnswerAnswer: B Explanation: Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling

May 27, 2022 No Comments READ MORE +

What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...

May 27, 2022 No Comments READ MORE +

Where are individual sites specified to be blacklisted in Cisco Umbrella?

Where are individual sites specified to be blacklisted in Cisco Umbrella?A . application settingsB . content categoriesC . security settingsD . destination listsView AnswerAnswer: D Explanation: Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists

May 27, 2022 No Comments READ MORE +