Which command do you enter to verify the Phase 1 status of a VPN connection?
Which command do you enter to verify the Phase 1 status of a VPN connection? A. sh crypto isakmp sa B. sh crypto ipsec sa C. debug crypto isakmp D. sh crypto session
Which command do you enter to verify the Phase 1 status of a VPN connection? A. sh crypto isakmp sa B. sh crypto ipsec sa C. debug crypto isakmp D. sh crypto session
Which action does standard antivirus software perform as part of the file-analysis process? A. execute the file in a simulated environment to examine its behavior B. create a backup copy of the file C. examine the execution instructions in the…
Which information can you display by executing the show crypto ipsec sa command? A. ISAKMP SAs that are established between two peers B. proxy information for the connection between two peers C. IPsec SAs established between two peers D. recent…
Refer to the exhibit. What is the effect of the given configuration? A. The two devices are able to pass the message digest to one another B. It enables authentication C. The two routers receive normal updates from one another…
How does the 802.1x supplicant communicate with the authentication server? A. The supplicant creates EAP packets and sends them to the authenticator, which translates them into RADIUS and forwards them to the authentication server. B. The supplicant creates EAP packets…
Which two actions can an end user take to manage a lost or stolen device in Cisco ISE? (Choose two.) A. Activate Cisco ISE Endpoint Protection Services to quarantine the device B. Add the MAC addresses of the device to…
A user on your network inadvertently activates a botnet program that was received as an email attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack? A. user-based access control rule B. reputation-based…
Which two attack types can be prevented with the implementation of a Cisco IPS solution? (Choose two.) A. VLAN hopping B. DDoS C. ARP spoofing D. worms E. man-in-the-middle
What are two challenges of using a network-based IPS? (Choose two.) A. It requires additional storage and processor capacity on syslog servers B. As the network expands, it requires you to add more sensors C. It is unable to determine…
How can you prevent NAT rules from sending traffic to incorrect interfaces? A. Assign the output interface in the NAT statement B. Add the no-proxy-arp command to the nat line C. Configure twice NAT instead of object NAT D. Use…