Why is it important to have a patching strategy for endpoints?

Why is it important to have a patching strategy for endpoints?A . to take advantage of new features released with patchesB . so that functionality is increased on a faster scale when it is usedC . so that known vulnerabilities are targeted and having a regular patch cycle reduces risksD...

April 14, 2022 No Comments READ MORE +

Which two cryptographic algorithms are used with IPsec? (Choose two)

Which two cryptographic algorithms are used with IPsec? (Choose two)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C,E Explanation: Cryptographic algorithms defined for use with IPsec include: + HMAC-SHA1/SHA2 for integrity protection and authenticity. + TripleDES-CBC for confidentiality + AES-CBC and AES-CTR for confidentiality. +...

April 14, 2022 No Comments READ MORE +

How does Cisco Advanced Phishing Protection protect users?

How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It utilizes sensors that send messages securely.E . It uses machine learning and real-time behavior analytics.View AnswerAnswer: D Explanation: Reference: https://docs.ces.cisco.com/docs/advanced-phishing-protection

April 14, 2022 1 Comment READ MORE +

Which system performs compliance checks and remote wiping?

Which system performs compliance checks and remote wiping?A . MDMB . ISEC . AMPD . OTPView AnswerAnswer: A

April 14, 2022 No Comments READ MORE +

What is the cause of this issue?

Refer to the exhibit. A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced. What is the cause of this issue?A . The key was configured in plain text.B . NTP authentication is not enabled.C ....

April 14, 2022 1 Comment READ MORE +

What is the purpose of the certificate signing request when adding a new certificate for a server?

What is the purpose of the certificate signing request when adding a new certificate for a server?A . It is the password for the certificate that is needed to install it with.B . It provides the server information so a certificate can be created and signedC . It provides the...

April 14, 2022 No Comments READ MORE +

What is the purpose of CA in a PKI?

What is the purpose of CA in a PKI?A . To issue and revoke digital certificatesB . To validate the authenticity of a digital certificateC . To create the private key for a digital certificateD . To certify the ownership of a public key by the named subjectView AnswerAnswer: A...

April 14, 2022 1 Comment READ MORE +

Which parameter is required when configuring a Netflow exporter on a Cisco Router?

Which parameter is required when configuring a Netflow exporter on a Cisco Router?A . DSCP valueB . Source interfaceC . Exporter nameD . Exporter descriptionView AnswerAnswer: C Explanation: An example of configuring a NetFlow exporter is shown below: flow exporter Exporter destination 192.168.100.22transport udp 2055

April 14, 2022 No Comments READ MORE +

Which role is assigned for Cisco FMC?

An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC?A . clientB . serverC . controllerD . publisherView AnswerAnswer: D

April 14, 2022 No Comments READ MORE +

What is the difference between Cross-site Scripting and SQL Injection, attacks?

What is the difference between Cross-site Scripting and SQL Injection, attacks?A . Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.B . Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL...

April 14, 2022 No Comments READ MORE +