Implementing and Operating Cisco Security Core Technologies v1.0

Page:    1 / 39   
Exam contains 589 questions

Which two descriptions of AES encryption are true? (Choose two.)

  • A. AES is less secure than 3DES.
  • B. AES is more secure than 3DES.
  • C. AES can use a 168-bit key for encryption.
  • D. AES can use a 256-bit key for encryption.
  • E. AES encrypts and decrypts a key three times in sequence.


Answer : BD

Reference:
https://gpdb.docs.pivotal.io/43190/admin_guide/topics/ipsec.html

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

  • A. STIX
  • B. XMPP
  • C. pxGrid
  • D. SMTP


Answer : A

Reference:
https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/ b_ScanCenter_Administrator_Guide_chapter_0100011.pdf

DRAG DROP -
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
Select and Place:



Answer :

Which VPN technology can support a multivendor environment and secure traffic between sites?

  • A. SSL VPN
  • B. GET VPN
  • C. FlexVPN
  • D. DMVPN


Answer : C

Reference:
https://www.cisco.com/c/en/us/products/collateral/routers/asr-1000-series-aggregation-services-routers/data_sheet_c78-704277.html

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

  • A. DMVPN
  • B. FlexVPN
  • C. IPsec DVTI
  • D. GET VPN


Answer : D

What is a commonality between DMVPN and FlexVPN technologies?

  • A. FlexVPN and DMVPN use the new key management protocol, IKEv2
  • B. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
  • C. IOS routers run the same NHRP code for DMVPN and FlexVPN
  • D. FlexVPN and DMVPN use the same hashing algorithms


Answer : C

Reference:
https://packetpushers.net/cisco-flexvpn-dmvpn-high-level-design/#:~:text=In%20its%20essence%2C%20FlexVPN%20is,both%20are%20Cisco's%
20proprietary%20technologies
.

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

  • A. DTLSv1
  • B. TLSv1
  • C. TLSv1.1
  • D. TLSv1.2


Answer : A

Reference:
https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215331-anyconnect-implementation-and-performanc.html

Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?

  • A. Talos
  • B. PSIRT
  • C. SCIRT
  • D. DEVNET


Answer : A

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

  • A. Common Vulnerabilities, Exploits and Threats
  • B. Common Vulnerabilities and Exposures
  • C. Common Exploits and Vulnerabilities
  • D. Common Security Exploits


Answer : B

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)

  • A. accounting
  • B. assurance
  • C. automation
  • D. authentication
  • E. encryption


Answer : BC

Reference:
https://www.cisco.com/c/en/us/products/cloud-systems-management/dna-center/index.html

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

  • A. ASDM
  • B. NetFlow
  • C. API
  • D. desktop client


Answer : C

What is a function of 3DES in reference to cryptography?

  • A. It encrypts traffic.
  • B. It creates one-time use passwords.
  • C. It hashes files.
  • D. It generates private keys.


Answer : A

Which two activities can be done using Cisco DNA Center? (Choose two.)

  • A. DHCP
  • B. design
  • C. accounting
  • D. DNS
  • E. provision


Answer : BE

Reference:
https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-2-1/user_guide/ b_dnac_ug_1_2_1/b_dnac_ug_1_2_chapter_00.pdf

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

  • A. terminal
  • B. selfsigned
  • C. url
  • D. profile


Answer : D

Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?

  • A. southbound API
  • B. westbound API
  • C. eastbound API
  • D. northbound API


Answer : D

Page:    1 / 39   
Exam contains 589 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy