Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two actions does the Cisco identity Services Engine posture module provide that ensures endpoint security?(Choose two.)

A.

The latest antivirus updates are applied before access is allowed.

B.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.

C.

Patch management remediation is performed.

D.

A centralized management solution is deployed.

E.

Endpoint supplicant configuration is deployed.

With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature?

A.

3

B.

5

C.

10

D.

12

What is the target in a phishing attack?

A.

perimeter firewall

B.

IPS

C.

web server

D.

endpoint

When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the

command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?

A.

The key server that is managing the keys for the connection will be at 1.2.3.4

B.

The remote connection will only be allowed from 1.2.3.4

C.

The address that will be used as the crypto validation authority

D.

All IP addresses other than 1.2.3.4 will be allowed

Which portion of the network do EPP solutions solely focus on and EDR solutions do not?

A.

server farm

B.

perimeter

C.

core

D.

East-West gateways

Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.

Refer to the exhibit. Which configuration item makes it possible to have the AAA session on the network?

A.

aaa authorization exec default ise

B.

aaa authentication enable default enable

C.

aaa authorization network default group ise

D.

aaa authorization login console ise