Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

July 24, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D Explanation: DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based. Therefore DTLS offers strongest throughput performance. The throughput...

July 24, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

July 24, 2021 No Comments READ MORE +

While using Cisco Firepower's Security Intelligence policies, which two criteria is Firepower block based upon? (Choose two)

While using Cisco Firepower's Security Intelligence policies, which two criteria is Firepower block based upon? (Choose two)A . URLsB . port numbersC . protocol IDsD . MAC addressesE . IP addressesView AnswerAnswer: AE

June 1, 2021 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower NGIPS?

Which feature requires a network discovery policy on the Cisco Firepower NGIPS?A . URL filteringB . impact flagsC . health monitoringD . security intelligenceView AnswerAnswer: B

June 1, 2021 No Comments READ MORE +

What is managed by Cisco Security Manager?

What is managed by Cisco Security Manager?A . Cisco ASAB . Cisco WLCC . Cisco WSAD . Cisco ESAView AnswerAnswer: A

June 1, 2021 No Comments READ MORE +

What are two DDoS attack categories? (Choose two)

What are two DDoS attack categories? (Choose two)A . sequentialB . protocolC . databaseD . volume-basedE . scree-basedView AnswerAnswer: BD

May 31, 2021 No Comments READ MORE +

What is the function of the Context Directory Agent?

What is the function of the Context Directory Agent?A . maintains users' group membershipsB . relays user authentication requests from Web Security Appliance to Active DirectoryC . reads the Active Directory logs to map IP addresses to usernamesD . accepts user authentication requests on behalf of Web Security Appliance for...

May 31, 2021 No Comments READ MORE +

After enabling the AVC engine, what must be done to implement this?

An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?A . Use security services to configure the traffic...

May 31, 2021 No Comments READ MORE +

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?A . Cisco AnyConnectB . Cisco TalosC . Cisco Dynamic DNSD . Cisco AMPView AnswerAnswer: B

May 30, 2021 No Comments READ MORE +