Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A
What is the problem according to this command output?
Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?A . PaasB . XaasC . IaasD . SaasView AnswerAnswer: A
What must be configured in order to prevent the session during the initial TCP communication?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?A . Configure the Cisco ESA to drop the malicious emails.B . Configure policies to quarantine malicious emails.C . Configure policies to stop and reject...
Which command enables 802.1X globally on a Cisco switch?
Which command enables 802.1X globally on a Cisco switch?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . aaa new-modelView AnswerAnswer: A
Which two activities can be done using Cisco DNA Center? (Choose two.)
Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: B E
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . profileC . terminalD . selfsignedView AnswerAnswer: B
What is the admin5 user able to do on HQ_Router after this configuration?
Refer to the exhibit. A network administrator configures command authorization for the admm5 user. What is the admin5 user able to do on HQ_Router after this configuration?A . complete no configurationsB . add subinterfacesC . complete all configurationsD . set the IP address of an interfaceView AnswerAnswer: A
What is a difference between DMVPN and sVTI?
What is a difference between DMVPN and sVTI?A . DMVPN supports tunnel encryption, whereas sVTI does not.B . DMVPN supports dynamic tunnel establishment, whereas sVTI does not.C . DMVPN supports static tunnel establishment, whereas sVTI does not.D . DMVPN provides interoperability with other vendors, whereas sVTI does not.View AnswerAnswer: B