Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D Explanation: DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based. Therefore DTLS offers strongest throughput performance. The throughput...
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
While using Cisco Firepower's Security Intelligence policies, which two criteria is Firepower block based upon? (Choose two)
While using Cisco Firepower's Security Intelligence policies, which two criteria is Firepower block based upon? (Choose two)A . URLsB . port numbersC . protocol IDsD . MAC addressesE . IP addressesView AnswerAnswer: AE
Which feature requires a network discovery policy on the Cisco Firepower NGIPS?
Which feature requires a network discovery policy on the Cisco Firepower NGIPS?A . URL filteringB . impact flagsC . health monitoringD . security intelligenceView AnswerAnswer: B
What is managed by Cisco Security Manager?
What is managed by Cisco Security Manager?A . Cisco ASAB . Cisco WLCC . Cisco WSAD . Cisco ESAView AnswerAnswer: A
What are two DDoS attack categories? (Choose two)
What are two DDoS attack categories? (Choose two)A . sequentialB . protocolC . databaseD . volume-basedE . scree-basedView AnswerAnswer: BD
What is the function of the Context Directory Agent?
What is the function of the Context Directory Agent?A . maintains users' group membershipsB . relays user authentication requests from Web Security Appliance to Active DirectoryC . reads the Active Directory logs to map IP addresses to usernamesD . accepts user authentication requests on behalf of Web Security Appliance for...
After enabling the AVC engine, what must be done to implement this?
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?A . Use security services to configure the traffic...
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?A . Cisco AnyConnectB . Cisco TalosC . Cisco Dynamic DNSD . Cisco AMPView AnswerAnswer: B