What must be configured to accomplish this?

An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically. What must be configured to accomplish this?A . Configure the Cisco WSA to...

April 9, 2021 No Comments READ MORE +

Which attack type attempts to shut down a machine or network so that users are not able to access it?

Which attack type attempts to shut down a machine or network so that users are not able to access it?A . IP spoofingB . bluesnarfingC . MAC spoofingD . smurfView AnswerAnswer: D

April 9, 2021 No Comments READ MORE +

Which algorithm provides asymmetric encryption?

Which algorithm provides asymmetric encryption?A . RC4B . RSAC . AESD . 3DESView AnswerAnswer: B Explanation: https://securityboulevard.com/2020/05/types-of-encryption-5-encryption-algorithms-how-to-choose-the-right-on

April 9, 2021 No Comments READ MORE +

What are two functions of secret key cryptography? (Choose two.)

What are two functions of secret key cryptography? (Choose two.)A . key selection without integer factorizationB . utilization of different keys for encryption and decryptionC . utilization of large prime number iterationsD . utilization of less memoryE . provides the capability to only know the key on one sideView AnswerAnswer:...

April 9, 2021 No Comments READ MORE +

Which port on the firewall must be opened to allow the CoA traffic to traverse the network?

An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?A . TCP 6514B . UDP 1700C . TCP 49D . UDP 1812View AnswerAnswer: B...

April 9, 2021 No Comments READ MORE +

What is managed by Cisco Security Manager?

What is managed by Cisco Security Manager?A . WSAB . ASAC . access point OD . ESAView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/products/collateral/security/security-manager/datasheet-C78-737182.html

April 9, 2021 No Comments READ MORE +

When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN configuration as opposed to DMVPN?

When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN configuration as opposed to DMVPN?A . Multiple routers or VRFs are required.B . Traffic is distributed statically by default.C . Floating static routes are required.D . HSRP is used for fallover.View AnswerAnswer: B

April 9, 2021 No Comments READ MORE +

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A

April 9, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . BJTLSvlC . TLSv1.1D . DTLSv1View AnswerAnswer: D

April 9, 2021 No Comments READ MORE +

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: D E

April 8, 2021 No Comments READ MORE +