We are always in need of great volunteers and have opportunities for individuals and groups.
QUESTION 1 Which two authentication types does OSPF support? (Choose two.) A. plaintext B. MD5 C. HMAC D. AES 256 E. SHA-1 F. DES Correct Answer: ABQUESTION 2 Which statement about personal firewalls is true? A. They can protect a system by denying probing requests. B. They are resilient against kernel attacks. C. They can protect email messages and private documents in a similar way to a VPN. D. They can protect the network against attacks. Correct Answer: A
QUESTION 3 Which two authentication 300-101 dumps types does OSPF support? (Choose two.) A. plaintext B. MD5 C. HMAC D. AES 256 E. SHA-1 F. DES Correct Answer: ABQUESTION 4 How does a device on a network using ISE receive its digital certificate during the new- device registration process? A. ISE acts as a SCEP proxy to enable the device to receive a certificate from a central CA server. B. ISE issues a certificate from its internal CA server. C. ISE issues a pre-defined certificate from a local database. D. The device requests a new certificate directly from a central CA. Correct Answer: A
QUESTION 5 Refer to the exhibit.The Admin user is unable to enter configuration mode on a device with the given configuration. What change can you make to the configuration to correct the problem? A. Remove the autocommand keyword and arguments from the username admin privilege line. B. Change the Privilege exec level value to 15. C. Remove the two Username Admin lines. D. Remove the Privilege exec line. Correct Answer: AQUESTION 6 When an administrator initiates a device wipe 200-310 dumps command from the ISE, what is the immediate effect? A. It requests the administrator to choose between erasing all device data or only managed corporate data. B. It requests the administrator to enter the device PIN or password before proceeding with the operation. C. It notifies the device user and proceeds with the erase operation. D. It immediately erases all data on the device. Correct Answer: A
QUESTION 7 Which two services define cloud networks? (Choose two.) A. Infrastructure as a Service B. Platform as a Service C. Security as a Service D. Compute as a Service E. Tenancy as a Service Correct Answer: ABQUESTION 8 You have implemented a Sourcefire IPS and configured it to block certain addresses utilizing Security Intelligence IP Address Reputation. A user calls and is not able to access a certain IP address. What action can you take to allow the user access to the IP address? A. Create a whitelist and add the appropriate IP address to allow the traffic. B. Create a custom blacklist to allow the traffic. C. Create a user based access control rule to allow the traffic. D. Create a network based access control 100-105 dumps rule to allow the traffic. E. Create a rule to bypass inspection to allow the traffic. Correct Answer: A
QUESTION 9 What is a benefit of a web application firewall? A. It blocks known vulnerabilities without patching applications. B. It simplifies troubleshooting. C. It accelerates web traffic. D. It supports all networking 400-251 dumps protocols. Correct Answer: AQUESTION 10 Refer to the exhibit.What is the effect of the given command sequence? A. It configures IKE Phase 1. B. It configures a site-to-site VPN tunnel. C. It configures a crypto 200-125 dumps policy with a key size of 14400. D. It configures IPSec Phase 2. Correct Answer: A
QUESTION 11 What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.) A. The Internet Key Exchange protocol establishes security associations B. The Internet Key Exchange protocol provides data confidentiality C. The Internet Key Exchange protocol provides replay detection D. The Internet Key Exchange protocol is responsible for mutual authentication Correct Answer: AD