The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?

The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A

March 28, 2024 No Comments READ MORE +

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . controlB . malwareC . URL filteringD . protectView AnswerAnswer: D

March 28, 2024 No Comments READ MORE +

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two)

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: A, C

March 27, 2024 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission.B . The attack is fragmented into groups of 8 octets before transmission.C . Short synchronized bursts of traffic are used to disrupt TCP connections.D . Malformed...

March 27, 2024 No Comments READ MORE +

traffic?

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist CenterB . File Reputation CenterC . AMP Reputation CenterD . IP and Domain Reputation CenterView AnswerAnswer: D

March 27, 2024 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D

March 27, 2024 No Comments READ MORE +

Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)

Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . PortB . RuleC . SourceD . ApplicationE . ProtocolView AnswerAnswer: B, C

March 26, 2024 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A Explanation: The data plane of any network is responsible for handling data packets that are transported across the network. (The data plane is also sometimes called the forwarding plane.) Maybe...

March 26, 2024 No Comments READ MORE +

What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...

March 26, 2024 No Comments READ MORE +

Appliance?

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)A . configure Active Directory Group Policies to push proxy settingsB . configure policy-based routing on the network infrastructureC . reference a Proxy Auto Config fileD . configure the proxy IP address...

March 26, 2024 No Comments READ MORE +