Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?

Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile.B . It defines a traffic baseline for traffic anomaly deduction.C . It inspects hosts that meet the profile with more intrusion rules.D . It blocks...

August 15, 2022 No Comments READ MORE +

encryption technology?

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . RSAC . DESD . AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation,as well...

August 15, 2022 No Comments READ MORE +

Which list contains the allowed recipient addresses?

An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?A . SATB . BATC . HATD . RATView AnswerAnswer: D

August 15, 2022 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

August 14, 2022 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . virusB . NTP amplificationC . ping of deathD . HTTP floodView AnswerAnswer: A

August 14, 2022 No Comments READ MORE +

Which action controls the amount of URI text that is stored in Cisco WSA logs files?

Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig commandB . Configure the advancedproxyconfig command with the HTTPS subcommandC . Configure a small log-entry size.D . Configure a maximum packet size.View AnswerAnswer: B

August 14, 2022 No Comments READ MORE +

Which ASA deployment mode meets these needs?

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C

August 14, 2022 No Comments READ MORE +

What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

August 14, 2022 No Comments READ MORE +

Which functions of an SDN architecture require southbound APIs to enable communication?

Which functions of an SDN architecture require southbound APIs to enable communication?A . SDN controller and the network elementsB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the cloudView AnswerAnswer: A Explanation: The Southbound API is used to communicate between Controllers...

August 14, 2022 No Comments READ MORE +

What is a result of the configuration?

Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirectedB . Traffic from the inside network is redirectedC . All TCP traffic is redirectedD . Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: The purpose of above...

August 13, 2022 No Comments READ MORE +