Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)A . PutB . OptionC . GetD . PushE . ConnectView AnswerAnswer: A C
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . ASDMB . desktop clientC . APID . NetFlowView AnswerAnswer: C
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...
What is a characteristic of Firepower NGIPS inline deployment mode?
What is a characteristic of Firepower NGIPS inline deployment mode?A . It cannot take actions such as blocking traffic.B . ASA with Firepower module cannot be deployed.C . it must have inline interface pairs configured.D . It is out-of-band from traffic.View AnswerAnswer: C
What is a commonality between DMVPN and FlexVPN technologies?
What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use the same hashing algorithms.B . IOS routers run the same NHRP code for DMVPN and FlexVPD . FlexVPN and DMVPN use the new key management protocol.E . FlexVPN and DMVPN use IS-IS routing protocol to communicate...
Which two cryptographic algorithms are used with IPsec? {Choose two.)
Which two cryptographic algorithms are used with IPsec? {Choose two.)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C E Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-mt/sec-sec-for-vpns-w-ips
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/detecti
What must be configured, based on a predefined threshold, to address this issue?
An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD ....
What must be used to share data between multiple security products?
What must be used to share data between multiple security products?A . Cisco Stealthwatch CloudB . Cisco Advanced Malware ProtectionC . Cisco Platform Exchange GridD . Cisco Rapid Threat ContainmentView AnswerAnswer: C