When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?

When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?A . RSA is an asymmetric key establishment algorithm intended to output symmetric keysB . RSA is a symmetric key establishment algorithm intended to output asymmetric keysC . DH is a symmetric key...

April 3, 2022 No Comments READ MORE +

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?A . when there is a need for traditional anti-malware detectionB . when there is no need to have the solution centrally managedC . when there is no firewall on the networkD . when...

April 3, 2022 No Comments READ MORE +

What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...

April 3, 2022 No Comments READ MORE +

Which type of attack is the device undergoing?

A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?A . phishingB . slowlorisC . pharmingD . SYN floodView AnswerAnswer: D

April 3, 2022 No Comments READ MORE +

What is a benefit of using a multifactor authentication strategy?

What is a benefit of using a multifactor authentication strategy?A . It provides visibility into devices to establish device trust.B . It provides secure remote access for applications.C . It provides an easy, single sign-on experience against multiple applicationsD . It protects data by enabling the use of a second...

April 2, 2022 No Comments READ MORE +

Which risk is created when using an Internet browser to access cloud-based service?

Which risk is created when using an Internet browser to access cloud-based service?A . misconfiguration of infrastructure, which allows unauthorized accessB . intermittent connection to the cloud connectorsC . vulnerabilities within protocolD . insecure implementation of APIView AnswerAnswer: C

April 2, 2022 No Comments READ MORE +

Which two actions should be selected to allow the traffic to pass without inspection?

A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two)A . permitB . trustC . resetD . allowE . monitorView AnswerAnswer: B,E...

April 2, 2022 No Comments READ MORE +

Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?

Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?A . AuditB . MandatoryC . OptionalD . VisibilityView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-4/admin_guide/b_ise_admin_guide_14/b_ise_admin_guide_14_chapter_010111.html

April 2, 2022 No Comments READ MORE +

Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?

Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?A . Cisco AMP for EndpointsB . Cisco AnyConnectC . Cisco UmbrellaD . Cisco DuoView AnswerAnswer: A

April 2, 2022 No Comments READ MORE +

Which tool should be used to accomplish this goal?

A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?A . Security ManagerB . CloudlockC . Web Security ApplianceD . Cisco ISEView...

April 2, 2022 No Comments READ MORE +