00:00

QUESTION 126

- (Exam Topic 3)
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?

Correct Answer: A

QUESTION 127

- (Exam Topic 3)
When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?

Correct Answer: D
Diffie Hellman (DH) uses a private-public key pair to establish a shared secret, typically a symmetric key. DH is not a symmetric algorithm – it is an asymmetric algorithm used to establish a shared secret for a symmetric key algorithm.

QUESTION 128

- (Exam Topic 2)
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)

Correct Answer: BE
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mtbook/sec-pk

QUESTION 129

- (Exam Topic 2)
Which attack type attempts to shut down a machine or network so that users are not able to access it?

Correct Answer: A
Denial-of-service (DDoS) aims at shutting down a network or service, causing it to be inaccessible to itsintended users.The Smurf attack is a DDoS attack in which large numbers of Internet Control Message Protocol (ICMP)packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IPbroadcast address.

QUESTION 130

- (Exam Topic 2)
What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

Correct Answer: A
Reference: https://docs.amp.cisco.com/AMP%20for%20Endpoints%20User%20Guide.pdfETHOS = Fuzzy Fingerprinting using static/passive heuristics
Reference: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2016/pdf/BRKSEC-2139.pdf