- (Exam Topic 3)
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
Correct Answer:
A
- (Exam Topic 3)
When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?
Correct Answer:
D
Diffie Hellman (DH) uses a private-public key pair to establish a shared secret, typically a symmetric key. DH is not a symmetric algorithm – it is an asymmetric algorithm used to establish a shared secret for a symmetric key algorithm.
- (Exam Topic 2)
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
Correct Answer:
BE
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mtbook/sec-pk
- (Exam Topic 2)
Which attack type attempts to shut down a machine or network so that users are not able to access it?
Correct Answer:
A
Denial-of-service (DDoS) aims at shutting down a network or service, causing it to be inaccessible to itsintended users.The Smurf attack is a DDoS attack in which large numbers of Internet Control Message Protocol (ICMP)packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IPbroadcast address.
- (Exam Topic 2)
What does Cisco AMP for Endpoints use to help an organization detect different families of malware?
Correct Answer:
A
Reference: https://docs.amp.cisco.com/AMP%20for%20Endpoints%20User%20Guide.pdfETHOS = Fuzzy Fingerprinting using static/passive heuristics
Reference: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2016/pdf/BRKSEC-2139.pdf