Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPN B. GET VPN C. FlexVPN D. DMVPNView AnswerAnswer: C Explanation: FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with...

August 19, 2023 No Comments READ MORE +

What is a difference between FlexVPN and DMVPN?

What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1 B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2 C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2 D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C

August 18, 2023 No Comments READ MORE +

How is DNS tunneling used to exfiltrate data out of a corporate network?

How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...

August 18, 2023 No Comments READ MORE +

Which SNMPv3 configuration must be used to support the strongest security possible?

Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy B. asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...

August 18, 2023 No Comments READ MORE +

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled. B. A sysopt command can be used to enable NSEL on a specific interface. C. NSEL can be used without a...

August 18, 2023 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission. B. The attack is fragmented into groups of 8 octets before transmission. C. Short synchronized bursts of traffic are used to disrupt TCP connections. D. Malformed...

August 18, 2023 No Comments READ MORE +