Which command was used to display this output?

Refer to the exhibit. Which command was used to display this output?A . show dot1x allB . show dot1xC . show dot1x all summaryD . show dot1x interface gi1/0/12View AnswerAnswer: A

April 7, 2021 No Comments READ MORE +

Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . multiple context modeB . user deployment of Layer 3 networksC . IPv6D . clusteringView AnswerAnswer: B

April 7, 2021 No Comments READ MORE +

In which cloud services model is the tenant responsible for virtual machine OS patching?

In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A

April 6, 2021 No Comments READ MORE +

What is the function of the Context Directory Agent?

What is the function of the Context Directory Agent?A . accepts user authentication requests on behalf of Web Security Appliance for user identificationB . relays user authentication requests from Web Security Appliance to Active DirectoryC . maintains users' group membershipsD . reads the Active Directory logs to map IP addresses...

April 6, 2021 No Comments READ MORE +

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?A . LDAPB . SDPC . subordinate CAD . HTTPE . SCPView AnswerAnswer: A D

April 6, 2021 No Comments READ MORE +

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?A . Encrypted Traffic AnalyticsB . Threat Intelligence DirectorC . Cognitive Threat AnalyticsD . Cisco Talos IntelligenceView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-troubleshoot-cis

April 6, 2021 No Comments READ MORE +

What does the number 15 represent in this configuration?

Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible failed attempts...

April 6, 2021 No Comments READ MORE +

What action would allow the attacker to gain access to machine 1 but not machine 2?

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending continuous...

April 6, 2021 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

April 6, 2021 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A

April 5, 2021 No Comments READ MORE +