What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
What does the API do when connected to a Cisco security appliance?
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . create an SNMP pull mechanism for managing AMPB . gather network telemetry information from AMP for endpointsC . get the process and PID information from the computers in the networkD . gather the...
Which two key and block sizes are valid for AES? (Choose two)
Which two key and block sizes are valid for AES? (Choose two)A . 128-bit block size, 192-bit key lengthB . 128-bit block size, 256-bit key lengthC . 64-bit block size, 168-bit key lengthD . 192-bit block size, 256-bit key lengthE . 64-bit block size, 112-bit key lengthView AnswerAnswer: AB
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . pushB . optionsC . connectD . putE . getView AnswerAnswer: AD
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . ProtocolB . SourceC . PortD . ApplicationE . RuleView AnswerAnswer: BE
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . web page imagesB . databaseC . Linux and Windows operating systemsD . user input validation in a web page or web applicationView AnswerAnswer: D
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and IPv6 configuredB . Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premisesC . Cisco FTDv configured in routed mode and managed by...
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the cloudC . management console and the SDN controllerD . SDN controller and the management solutionView AnswerAnswer: D