Why is it important to have a patching strategy for endpoints?
Why is it important to have a patching strategy for endpoints?A . to take advantage of new features released with patchesB . so that functionality is increased on a faster scale when it is usedC . so that known vulnerabilities are targeted and having a regular patch cycle reduces risksD...
Which two cryptographic algorithms are used with IPsec? (Choose two)
Which two cryptographic algorithms are used with IPsec? (Choose two)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C,E Explanation: Cryptographic algorithms defined for use with IPsec include: + HMAC-SHA1/SHA2 for integrity protection and authenticity. + TripleDES-CBC for confidentiality + AES-CBC and AES-CTR for confidentiality. +...
How does Cisco Advanced Phishing Protection protect users?
How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It utilizes sensors that send messages securely.E . It uses machine learning and real-time behavior analytics.View AnswerAnswer: D Explanation: Reference: https://docs.ces.cisco.com/docs/advanced-phishing-protection
Which system performs compliance checks and remote wiping?
Which system performs compliance checks and remote wiping?A . MDMB . ISEC . AMPD . OTPView AnswerAnswer: A
What is the cause of this issue?
Refer to the exhibit. A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced. What is the cause of this issue?A . The key was configured in plain text.B . NTP authentication is not enabled.C ....
What is the purpose of the certificate signing request when adding a new certificate for a server?
What is the purpose of the certificate signing request when adding a new certificate for a server?A . It is the password for the certificate that is needed to install it with.B . It provides the server information so a certificate can be created and signedC . It provides the...
What is the purpose of CA in a PKI?
What is the purpose of CA in a PKI?A . To issue and revoke digital certificatesB . To validate the authenticity of a digital certificateC . To create the private key for a digital certificateD . To certify the ownership of a public key by the named subjectView AnswerAnswer: A...
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
Which parameter is required when configuring a Netflow exporter on a Cisco Router?A . DSCP valueB . Source interfaceC . Exporter nameD . Exporter descriptionView AnswerAnswer: C Explanation: An example of configuring a NetFlow exporter is shown below: flow exporter Exporter destination 192.168.100.22transport udp 2055
Which role is assigned for Cisco FMC?
An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC?A . clientB . serverC . controllerD . publisherView AnswerAnswer: D
What is the difference between Cross-site Scripting and SQL Injection, attacks?
What is the difference between Cross-site Scripting and SQL Injection, attacks?A . Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.B . Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL...