1.
In which of the following authentication protocols is support for TLS 1.2 specifically required? (Select the best answer.)
2.
Router2 is configured to obtain time from three different NTP servers. You want to determine from which of the three servers Router2 is currently synchronizing time. Which of the following commands would not achieve your goal? (Select the best answer.)
3.
Which of the following indicates that aggressive mode ISAKMP peers have created SAs? (Select the best answer.)
4.
Which of the following is least likely to be considered an advanced persistent threat? (Select the best answer.)
5.
Which of the following best describes the purpose of SNMP? (Select the best answer.)
6.
You create a static pointtopoint VTI tunnel on RouterA. Afterward, you issue the show runningconfig command and receive the following output: Which of the following is the authentication transform that will be used by the static VTI tunnel? (Select the best answer.)
7.
To ease administrative overhead, you want to add a third party feed to a Security Intelligence device so that the IP addresses of known malicious hosts are automatically blacklisted. However, you have not determined whether the feed is valid. Which of the following are you most likely to do? (Select the best answer.)
8.
Which of the following is primarily true of SEM systems? (Select the best answer.)
9.
You want to configure Cisco ISE as a SCEP proxy to a Microsoft Windows 2008 R2 Server root CA. Which of the following also needs to be configured? (Select the best answer.)
10.
You issue the following commands on a Cisco router: tacacsserver host ts1 single-connection timeout 20 tacacsserver timeout 30 Which of the following are true about how the Cisco router communicates with the TACACS+ server? (Select 2 choices.)