What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

November 2, 2021 No Comments READ MORE +

What does the API do when connected to a Cisco security appliance?

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . create an SNMP pull mechanism for managing AMPB . gather network telemetry information from AMP for endpointsC . get the process and PID information from the computers in the networkD . gather the...

November 2, 2021 No Comments READ MORE +

Which two key and block sizes are valid for AES? (Choose two)

Which two key and block sizes are valid for AES? (Choose two)A . 128-bit block size, 192-bit key lengthB . 128-bit block size, 256-bit key lengthC . 64-bit block size, 168-bit key lengthD . 192-bit block size, 256-bit key lengthE . 64-bit block size, 112-bit key lengthView AnswerAnswer: AB

November 2, 2021 No Comments READ MORE +

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC

November 1, 2021 No Comments READ MORE +

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . pushB . optionsC . connectD . putE . getView AnswerAnswer: AD

November 1, 2021 1 Comment READ MORE +

Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)

Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . ProtocolB . SourceC . PortD . ApplicationE . RuleView AnswerAnswer: BE

November 1, 2021 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...

November 1, 2021 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . web page imagesB . databaseC . Linux and Windows operating systemsD . user input validation in a web page or web applicationView AnswerAnswer: D

October 31, 2021 No Comments READ MORE +

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and IPv6 configuredB . Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premisesC . Cisco FTDv configured in routed mode and managed by...

October 31, 2021 No Comments READ MORE +

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the cloudC . management console and the SDN controllerD . SDN controller and the management solutionView AnswerAnswer: D

October 31, 2021 No Comments READ MORE +