Which two statements about a device with this configuration are true?

Refer to the exhibit. Router(contig)# cts sxp reconciliation period 180 Which two statements about a device with this configuration are true? (Choose twoA . When a peer re-establishes a previous connection to the device. CTS retains all existing SGT mapping entries for 3 minutesB . If a peer reconnects to...

December 10, 2019 No Comments READ MORE +

Which statement is true regarding the failover link when ASAs are configured in a failover mode?

Which statement is true regarding the failover link when ASAs are configured in a failover mode?A . The information sent over the failover link cannot be in dear textB . Failover key is not required for the secure communication over the failover linkC . Configuration replication sent across the link...

December 10, 2019 No Comments READ MORE +

Which possible cause is true?

Refer to the exhibit. Users cannot access web servers 192. 168 101.3/24 and 192. 168 102.3/24 using FireFox web browser when initiated from 172.61.1.0/24 network. Which possible cause is true?A . The access policy "Allow policy" is porting to an incorrect identification profileB . The identification profile "Allowed Profile" has...

December 10, 2019 No Comments READ MORE +

Which two possible issues are true?

Refer to the exhibit. R3 ip vrf mgmt ! crypto keyring CCIE vrf mgmt pre-shared-key address 0.0.0.0 0.0.0.0 key cisco ! crypto isakmp policy 33 encr 3des authentication pre-share group 2 lifetime 600 ! crypto ipsec transform-set site_ab esp-aes-256 esp-sha-hmac mode tunnel ! crypto ipsec profile site_a set security-association lifetime...

December 10, 2019 No Comments READ MORE +

Which statement about x 509 certificates is true?

Which statement about x 509 certificates is true?A . The Subject distinguished name in the certificate is of the entity who issued the certificateB . The issuer distinguished name in the certificate is of the entity receiving the certificateC . The algorithm in the certificate is used by the receiver...

December 10, 2019 No Comments READ MORE +

Which three messages are part of the SSL protocol? (Choose three)

Which three messages are part of the SSL protocol? (Choose three)A . OFFERB . RecordC . Cipher SpecD . Message AuthenticationE . DISCOVERYF . AlertG . HandshakeH . Change Cipher SpecView AnswerAnswer: FGH 

December 10, 2019 No Comments READ MORE +

Which two actions do you suggest to fix this issue?

A university has hired you as a consultant to advise them on the best method to prevent DHCP starvation attacks in the campus. They have already implemented DH CP snooping and port security to control the situation but those do not fully contain the issue. Which two actions do you...

December 10, 2019 No Comments READ MORE +

Which two ploicies are used to set this up?

In your Corporate environment, you have various Active Directory groups based o the organizational structure and would like to ensure that users are only able to access certain resources depending on which groups(s)they belong to This policy should apply across the network, You have ISE, ASA and WSA deployed, and...

December 9, 2019 No Comments READ MORE +

Which cause of the issue is true?

Refer to the exhibit. The FMC with address 161 1 7 16 is not seeing AMP Connector scan events that are reported to the AMP cloud from the test-pc Windows machine that belongs to "protect" group. Which cause of the issue is true?A . The Windows machine belongs to an...

December 9, 2019 No Comments READ MORE +

Which statement about SSL policy implementation in a cisco Firepower system is true?

Which statement about SSL policy implementation in a cisco Firepower system is true?A . Access control policy is optional for the SSL policy implementationB . If Firepower system cannot decrypt the traffic, it allows the connectionC . Intrusion policy is mandatory to configure the SSL inspectionD . Access control policy...

December 9, 2019 No Comments READ MORE +