Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)A . PutB . OptionC . GetD . PushE . ConnectView AnswerAnswer: A C

April 11, 2021 No Comments READ MORE +

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C

April 11, 2021 No Comments READ MORE +

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . ASDMB . desktop clientC . APID . NetFlowView AnswerAnswer: C

April 11, 2021 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...

April 11, 2021 No Comments READ MORE +

What is a characteristic of Firepower NGIPS inline deployment mode?

What is a characteristic of Firepower NGIPS inline deployment mode?A . It cannot take actions such as blocking traffic.B . ASA with Firepower module cannot be deployed.C . it must have inline interface pairs configured.D . It is out-of-band from traffic.View AnswerAnswer: C

April 11, 2021 No Comments READ MORE +

What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use the same hashing algorithms.B . IOS routers run the same NHRP code for DMVPN and FlexVPD . FlexVPN and DMVPN use the new key management protocol.E . FlexVPN and DMVPN use IS-IS routing protocol to communicate...

April 11, 2021 No Comments READ MORE +

Which two cryptographic algorithms are used with IPsec? {Choose two.)

Which two cryptographic algorithms are used with IPsec? {Choose two.)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C E Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-mt/sec-sec-for-vpns-w-ips

April 11, 2021 No Comments READ MORE +

Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.

Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/detecti

April 10, 2021 No Comments READ MORE +

What must be configured, based on a predefined threshold, to address this issue?

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD ....

April 10, 2021 No Comments READ MORE +

What must be used to share data between multiple security products?

What must be used to share data between multiple security products?A . Cisco Stealthwatch CloudB . Cisco Advanced Malware ProtectionC . Cisco Platform Exchange GridD . Cisco Rapid Threat ContainmentView AnswerAnswer: C

April 10, 2021 No Comments READ MORE +