Which option is the main function of Cisco Firepower impact flags?

Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They identify data that the ASA sends to the Firepower module.C . They correlate data about intrusions and vulnerability.D . They highlight known and suspected malicious IP addresses in reports.View...

November 9, 2021 No Comments READ MORE +

Which form of attack is launched using botnets?

Which form of attack is launched using botnets?A . DDOSB . EIDDOSC . TCP floodD . virusView AnswerAnswer: A

November 8, 2021 No Comments READ MORE +

Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . Flex VPND . DMVPNView AnswerAnswer: B

November 8, 2021 1 Comment READ MORE +

What action is needed to authenticate the VPN?

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on host A. B. Enter the...

November 7, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D

November 7, 2021 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . DDoSC . buffer overflowD . water holingView AnswerAnswer: C

November 7, 2021 No Comments READ MORE +

What is the result of this Python script of the Cisco DNA Center API?

Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds a switch to Cisco DNA CenterB . adds authentication to a switchC . receives information about a switchView AnswerAnswer: A

November 7, 2021 No Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two)

Which two descriptions of AES encryption are true? (Choose two)A . AES is more secure than 3DEC . AES can use a 168-bit key for encryption.D . AES can use a 256-bit key for encryption.E . AES encrypts and decrypts a key three times in sequence.F . AES is less...

November 7, 2021 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . SHA-96B . SHA-384C . AES-GCMD . AES-256View AnswerAnswer: C

November 6, 2021 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . ping of deathB . HTTP floodC . virusD . NTP amplificationView AnswerAnswer: C

November 6, 2021 No Comments READ MORE +