<< Prev Question Next Question >>

Question 78/292

Which algorithm provides encryption and authentication for data plane communication?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (292q)
Question 1: Drag and drop the NetFlow export formats from the left onto ...
Question 2: Which DevSecOps implementation process gives a weekly or dai...
Question 3: Which factor must be considered when choosing the on-premise...
Question 4: (Exhibit) Refer to the exhibit. All servers are in the same ...
Question 5: Which attribute has the ability to change during the RADIUS ...
Question 6: What provides the ability to program and monitor networks fr...
Question 7: What is a function of the Layer 4 Traffic Monitor on a Cisco...
Question 8: Drag and drop the concepts from the left onto the correct de...
Question 9: How does Cisco Stealthwatch Cloud provide security for cloud...
Question 10: What is a characteristic of an EDR solution and not of an EP...
Question 11: Which two services must remain as on-premises equipment when...
Question 12: What is the benefit of installing Cisco AMP for Endpoints on...
Question 13: What is a description of microsegmentation?...
Question 14: Which two capabilities of Integration APIs are utilized with...
Question 15: Which two risks is a company vulnerable to if it does not ha...
Question 16: When a next-generation endpoint security solution is selecte...
Question 17: Why is it important to have a patching strategy for endpoint...
Question 18: Elliptic curve cryptography is a stronger more efficient cry...
Question 19: II An engineer musi set up 200 new laptops on a network and ...
Question 20: What are two characteristics of Cisco DNA Center APIs? (Choo...
Question 21: Which system facilitates deploying microsegmentation and mul...
Question 22: Which threat intelligence standard contains malware hashes?...
Question 23: What is an attribute of Cisco Talos?...
Question 24: For Cisco IOS PKI, which two types of Servers are used as a ...
Question 25: What are two benefits of using Cisco Duo as an MFA solution?...
Question 26: In which two customer environments is the Cisco Secure Web A...
Question 27: What is an advantage of using a next-generation firewall com...
Question 28: Refer to the exhibit, (Exhibit) which command results in the...
Question 29: Which network monitoring solution uses streams and pushes op...
Question 30: What is the purpose of the Decrypt for Application Detection...
Question 31: Drag and drop the Firepower Next Generation Intrusion Preven...
Question 32: Refer to the exhibit. (Exhibit) Traffic is not passing throu...
Question 33: How does a cloud access security broker function?...
Question 34: What are two workloaded security models? (Choose two)...
Question 35: (Exhibit) Refer to the exhibit. An engineer is implementing ...
Question 36: What are two advantages of using Cisco Any connect over DMVP...
Question 37: An engineer is configuring 802.1X authentication on Cisco sw...
Question 38: An organization wants to secure users, data, and application...
Question 39: Refer to the exhibit. (Exhibit) Which configuration item mak...
Question 40: Which two characteristics of messenger protocols make data e...
Question 41: Refer to the exhibit. (Exhibit) What does the API do when co...
Question 42: An engineer is configuring AMP for endpoints and wants to bl...
Question 43: Refer to the exhibit. (Exhibit) An administrator is adding a...
Question 44: Which two protocols must be configured to authenticate end u...
Question 45: Which VMware platform does Cisco ACI integrate with to provi...
Question 46: Which feature is configured for managed devices in the devic...
Question 47: What is a capability of Cisco ASA Netflow?...
Question 48: Which API technology with SDN architecture is used to commun...
Question 49: Which threat involves software being used to gain unauthoriz...
Question 50: Which solution for remote workers enables protection, detect...
Question 51: Which action configures the IEEE 802.1X Flexible Authenticat...
Question 52: What is a benefit of using a multifactor authentication stra...
Question 53: Which two criteria must a certificate meet before the WSA us...
Question 54: Which security product enables administrators to deploy Kube...
Question 55: An engineer is configuring Cisco Secure Endpoint to enhance ...
Question 56: Refer to the exhibit. (Exhibit) What are two indications of ...
Question 57: What is the difference between deceptive phishing and spear ...
Question 58: Cisco SensorBase gaihers threat information from a variety o...
Question 59: Which two preventive measures are used to control cross-site...
Question 60: Why is it important to implement MFA inside of an organizati...
Question 61: Which Cisco platform onboards the endpoint and can issue a C...
Question 62: How does Cisco Advanced Phishing Protection protect users?...
Question 63: Which two request of REST API are valid on the Cisco ASA Pla...
Question 64: Refer to the exhibit. (Exhibit) What will happen when this P...
Question 65: What is the function of Cisco Cloudlock for data security?...
Question 66: Which DoS attack uses fragmented packets in an attempt to cr...
Question 67: An engineer is configuring cloud logging on Cisco ASA and ne...
Question 68: Drag and drop the security solutions from the left onto the ...
Question 69: What is the role of an endpoint in protecting a user from a ...
Question 70: Which standard is used to automate exchanging cyber threat i...
Question 71: What is a difference between a zone-based firewall and a Cis...
Question 72: A company recently discovered an attack propagating througho...
Question 73: (Exhibit) Refer to the exhibit. An engineer must enable secu...
Question 74: An organization is trying to implement micro-segmentation on...
Question 75: Under which two circumstances is a CoA issued? (Choose two)...
Question 76: What is a language format designed to exchange threat intell...
Question 77: What are two Detection and Analytics Engines of Cognitive Th...
Question 78: Which algorithm provides encryption and authentication for d...
Question 79: Which two are valid suppression types on a Cisco Next Genera...
Question 80: Which Cisco WSA feature supports access control using URL ca...
Question 81: Which Cisco Firewall solution requires zone definition?...
Question 82: In which cloud services model is the tenant responsible for ...
Question 83: Which two actions does the Cisco identity Services Engine po...
Question 84: In which type of attack does the attacker insert their machi...
Question 85: An engineer needs a solution for TACACS+ authentication and ...
Question 86: An engineer configured a new network identity in Cisco Umbre...
Question 87: An engineer must modify a policy to block specific addresses...
Question 88: What is the purpose of the My Devices Portal in a Cisco ISE ...
Question 89: An engineer is deploying a Cisco Secure Email Gateway and mu...
Question 90: When a Cisco Secure Web Appliance checks a web request, what...
Question 91: In which scenario is endpoint-based security the solution?...
Question 92: A network administrator has configured TACACS on a network d...
Question 93: Which category includes DoS Attacks?...
Question 94: Which two activities can be done using Cisco DNA Center? (Ch...
Question 95: Based on the NIST 800-145 guide, which cloud architecture ma...
Question 96: Email security has become a high-priority task for a securit...
Question 97: Why would a user choose an on-premises ESA versus the CES so...
Question 98: In which two ways does a system administrator send web traff...
Question 99: An engineer is configuring cloud logging using a company-man...
Question 100: What are two security benefits of an MDM deployment? (Choose...
Question 101: Which functions of an SDN architecture require southbound AP...
Question 102: What is the purpose of a denial-of-service attack?...
Question 103: When planning a VPN deployment, for which reason does an eng...
Question 104: Drag and drop the Cisco CWS redirection options from the lef...
Question 105: Which Cisco cloud security software centrally manages polici...
Question 106: Which characteristic is unique to a Cisco WSAv as compared t...
Question 107: A Cisco Secure Cloud Analytics administrator is setting up a...
Question 108: What is a functional difference between Cisco Secure Endpoin...
Question 109: Which method is used to deploy certificates and configure th...
Question 110: An engineer is trying to securely connect to a router and wa...
Question 111: Which Cisco security solution gives the most complete view o...
Question 112: What must be configured on Cisco Secure Endpoint to create a...
Question 113: Which solution should be leveraged for secure access of a CI...
Question 114: Which feature requires that network telemetry be enabled?...
Question 115: Which two aspects of the cloud PaaS model are managed by the...
Question 116: Which two devices support WCCP for traffic redirection? (Cho...
Question 117: An organization has DHCP servers set up to allocate IP addre...
Question 118: Which compliance status is shown when a configured posture p...
Question 119: A company is experiencing exfiltration of credit card number...
Question 120: Which two components do southbound APIs use to communicate w...
Question 121: An engineer must modify a policy to block specific addresses...
Question 122: Which two mechanisms are used to control phishing attacks? (...
Question 123: When MAB is configured for use within the 802.1X environment...
Question 124: A user has a device in the network that is receiving too man...
Question 125: Due to a traffic storm on the network, two interfaces were e...
Question 126: When a Cisco WSA checks a web request, what occurs if it is ...
Question 127: Which two statements about a Cisco WSA configured in Transpa...
Question 128: A small organization needs to reduce the VPN bandwidth load ...
Question 129: (Exhibit) Refer to the exhibit. Traffic is not passing throu...
Question 130: An engineer is configuring their router to send NetfFow data...
Question 131: Which type of dashboard does Cisco DNA Center provide for co...
Question 132: Which two capabilities of Integration APIs are utilized with...
Question 133: Refer to the exhibit. (Exhibit) What is a result of the conf...
Question 134: A network security engineer must export packet captures from...
Question 135: An engineer is configuring Cisco Umbrella and has an identit...
Question 136: Which technology should be used to help prevent an attacker ...
Question 137: An organization wants to use Cisco FTD or Cisco ASA devices....
Question 138: Which threat intelligence standard contains malware hashes?...
Question 139: An engineer must enable Outbreak Filters globally on an Asyn...
Question 140: Which two application layer preprocessors are used by Firepo...
Question 141: (Choose two)
Question 142: In an IaaS cloud services model, which security function is ...
Question 143: Which Cisco Umbrella package supports selective proxy for In...
Question 144: What are two functions of IKEv1 but not IKEv2? (Choose two)...
Question 145: An organization has a requirement to collect full metadata i...
Question 146: What is a benefit of using telemetry over SNMP to configure ...
Question 147: What is the benefit of integrating Cisco ISE with a MDM solu...
Question 148: An organization has two systems in their DMZ that have an un...
Question 149: Drag and drop the suspicious patterns for the Cisco Tetratio...
Question 150: When wired 802.1X authentication is implemented, which two c...
Question 151: What is the function of the crypto is a kmp key cisc40639795...
Question 152: What must be enabled to secure SaaS-based applications?...
Question 153: An engineer is configuring Cisco WSA and needs to deploy it ...
Question 154: Which feature is used to restrict communication between inte...
Question 155: What is the purpose of the certificate signing request when ...
Question 156: Which two methods must be used to add switches into the fabr...
Question 157: Email security has become a high priority task for a securit...
Question 158: Which MDM configuration provides scalability?...
Question 159: Which RADIUS feature provides a mechanism to change the AAA ...
Question 160: Which ID store requires that a shadow user be created on Cis...
Question 161: Which form of attack is launched using botnets?...
Question 162: Which Cisco network security device supports contextual awar...
Question 163: In a PaaS model, which layer is the tenant responsible for m...
Question 164: Which kind of API that is used with Cisco DNA Center provisi...
Question 165: What are two facts about WSA HTTP proxy configuration with a...
Question 166: An email administrator is setting up a new Cisco ESA. The ad...
Question 167: Which two Cisco Umbrella security categories are used to pre...
Question 168: Refer to the exhibit. (Exhibit) Which command was used to ge...
Question 169: Why should organizations migrate to an MFA strategy for auth...
Question 170: An organization must add new firewalls to its infrastructure...
Question 171: What is the purpose of CA in a PKI?...
Question 172: An engineer has been tasked with configuring a Cisco FTD to ...
Question 173: Which type of algorithm provides the highest level of protec...
Question 174: An engineer wants to automatically assign endpoints that hav...
Question 175: A network administrator is configuring a role in an access c...
Question 176: Drag and drop the posture assessment flow actions from the l...
Question 177: Which two prevention techniques are used to mitigate SQL inj...
Question 178: Why is it important to patch endpoints consistently?...
Question 179: A network engineer is configuring NetFlow top talkers on a C...
Question 180: A switch with Dynamic ARP Inspection enabled has received a ...
Question 181: An engineer is deploying Cisco Advanced Malware Protection (...
Question 182: A security engineer is tasked with configuring TACACS on a C...
Question 183: In which two ways does Easy Connect help control network acc...
Question 184: Which posture assessment requirement provides options to the...
Question 185: What does Cisco ISE use to collect endpoint attributes that ...
Question 186: A network engineer must configure a Cisco ESA to prompt user...
Question 187: When using Cisco AMP for Networks which feature copies a fil...
Question 188: An engineer used a posture check on a Microsoft Windows endp...
Question 189: Which IETF attribute is supported for the RADIUS CoA feature...
Question 190: An engineer must implement a file transfer solution between ...
Question 191: What is a characteristic of Cisco ASA Netflow v9 Secure Even...
Question 192: Refer to the exhibit. (Exhibit) Consider that any feature of...
Question 193: What is an advantage of network telemetry over SNMP pulls?...
Question 194: DoS attacks are categorized as what?...
Question 195: Which service allows a user export application usage and per...
Question 196: Drag and drop the solutions from the left onto the solution'...
Question 197: Refer to the exhibit. (Exhibit) Which command was used to di...
Question 198: An engineer is configuring guest WLAN access using Cisco ISE...
Question 199: An engineer is implementing Cisco CES in an existing Microso...
Question 200: What is an attribute of the DevSecOps process?...
Question 201: An administrator is implementing management plane protection...
Question 202: Which solution protects hybrid cloud deployment workloads wi...
Question 203: What are two characteristics of the RESTful architecture use...
Question 204: How does the Cisco WSA enforce bandwidth restrictions for we...
Question 205: Which attack is preventable by Cisco ESA but not by the Cisc...
Question 206: What is a functional difference between Cisco AMP for Endpoi...
Question 207: What is a benefit of using Cisco FMC over Cisco ASDM?...
Question 208: What is a characteristic of Dynamic ARP Inspection?...
Question 209: An organization is trying to improve their Defense in Depth ...
Question 210: Refer to the exhibit. (Exhibit) Refer to the exhibit. A Cisc...
Question 211: Which feature within Cisco ISE verifies the compliance of an...
Question 212: For which two conditions can an endpoint be checked using IS...
Question 213: Which attack type attempts to shut down a machine or network...
Question 214: Which type of data does the Cisco Stealthwatch system collec...
Question 215: A network administrator configures Dynamic ARP Inspection on...
Question 216: A security engineer must add destinations into a destination...
Question 217: Which IPS engine detects ARP spoofing?...
Question 218: A large organization wants to deploy a security appliance in...
Question 219: A customer has various external HTTP resources available inc...
Question 220: Which Cisco security solution secures public, private, hybri...
Question 221: How many interfaces per bridge group does an ASA bridge grou...
Question 222: Which PKI enrollment method allows the user to separate auth...
Question 223: When choosing an algorithm to us, what should be considered ...
Question 224: An engineer needs to configure a Cisco Secure Email Gateway ...
Question 225: An engineer must configure Cisco AMP for Endpoints so that i...
Question 226: An engineer is configuring Cisco WSA and needs to enable a s...
Question 227: In which cloud services model is the customer responsible fo...
Question 228: What are two reasons for implementing a multifactor authenti...
Question 229: Which function is the primary function of Cisco AMP threat G...
Question 230: Which Cisco security solution stops exfiltration using HTTPS...
Question 231: (Exhibit) Refer to the exhibit. When configuring this access...
Question 232: Which information is required when adding a device to Firepo...
Question 233: Where are individual sites specified to be block listed in C...
Question 234: What are the two most commonly used authentication factors i...
Question 235: Which feature is supported when deploying Cisco ASAv within ...
Question 236: An administrator is configuring N I P on Cisco ASA via ASDM ...
Question 237: An engineer integrates Cisco FMC and Cisco ISE using pxGrid ...
Question 238: Which policy represents a shared set of features or paramete...
Question 239: What are two functionalities of SDN Northbound APIs? (Choose...
Question 240: Which technology must be used to implement secure VPN connec...
Question 241: In which situation should an Endpoint Detection and Response...
Question 242: An engineer is configuring IPsec VPN and needs an authentica...
Question 243: (Exhibit) Refer to the exhibit. What function does the API k...
Question 244: After deploying a Cisco ESA on your network, you notice that...
Question 245: What is the difference between a vulnerability and an exploi...
Question 246: (Exhibit) Refer to the exhibit. What is the result of the Py...
Question 247: A network engineer must create an access control list on a C...
Question 248: What are two benefits of Flexible NetFlow records? (Choose t...
Question 249: What are two Trojan malware attacks? (Choose two)...
Question 250: An engineer must deploy a Cisco Secure Web Appliance. Antima...
Question 251: Which type of encryption uses a public key and private key?...
Question 252: Which benefit does endpoint security provide the overall sec...
Question 253: Which two functions does the Cisco Advanced Phishing Protect...
Question 254: During a recent security audit a Cisco IOS router with a wor...
Question 255: While using Cisco Secure Firewall's Security Intelligence po...
Question 256: A network engineer is configuring a Cisco Catalyst switch. T...
Question 257: Which component of Cisco umbrella architecture increases rel...
Question 258: Which technology reduces data loss by identifying sensitive ...
Question 259: Based on the NIST 800-145 guide, which cloud architecture is...
Question 260: Refer to the exhibit. (Exhibit) An engineer configured wired...
Question 261: Which firewall mode does a Cisco Adaptive Security Appliance...
Question 262: An engineer must deploy Cisco Secure Email with Cloud URL An...
Question 263: Which attack gives unauthorized access to files on the web s...
Question 264: What is the difference between deceptive phishing and spear ...
Question 265: What is a difference between GETVPN and IPsec?...
Question 266: How does Cisco Umbrella archive logs to an enterprise owned ...
Question 267: What does the Cloudlock Apps Firewall do to mitigate securit...
Question 268: What is a feature of container orchestration?...
Question 269: Which two types of connectors are used to generate telemetry...
Question 270: Which feature of Cisco ASA allows VPN users to be postured a...
Question 271: An organization is implementing URL blocking using Cisco Umb...
Question 272: What is an advantage of the Cisco Umbrella roaming client?...
Question 273: A Cisco FTD engineer is creating a new IKEv2 policy called s...
Question 274: What are two DDoS attack categories? (Choose two)...
Question 275: An organization wants to improve its cybersecurity processes...
Question 276: An engineer needs to configure an access control policy rule...
Question 277: Which Secure Email Gateway implementation method segregates ...
Question 278: Which solution supports high availability in routed or trans...
Question 279: What is the role of Cisco Umbrella Roaming when it is instal...
Question 280: When a transparent authentication fails on the Web Security ...
Question 281: What is a difference between a DoS attack and a DDoS attack?...
Question 282: What is the process of performing automated static and dynam...
Question 283: Which technology is used to improve web traffic performance ...
Question 284: Which Cisco AMP feature allows an engineer to look back to t...
Question 285: When network telemetry is implemented, what is important to ...
Question 286: An organization received a large amount of SPAM messages ove...
Question 287: Which parameter is required when configuring a Netflow expor...
Question 288: What is a difference between weak passwords and missing encr...
Question 289: Which type of API is being used when a security application ...
Question 290: Which cloud service model offers an environment for cloud co...
Question 291: What is the purpose of a NetFlow version 9 template record?...
Question 292: Which service allows a user to export application usage and ...