1.
Which of the following describes the primary difference between PGP and S/MIME? (Select the best answer.)
2.
Which of the following failover link configurations can leave an ASA vulnerable to replay attacks? (Select the best answer.)
3.
Which of the following fields make up the header of an ESP packet? (Select 2 choices.)
4.
You want to use the authentication event noresponse action authorize vlan 101 command to ensure that network devices incapable of using 802.1X authentication are automatically placed into VLAN 101, which is the guest VLAN. Which of the following VLAN types can you specify as an 802.1X guest VLAN? (Select the best answer.)
5.
What is another term for 802.11i wireless network security?
6.
Where is client traffic decrypted in a controller-based wireless network protected with WPA2 Security?
7.
Which setting provides the best security for a WLAN and authenticates users against a centralized directory store?

 
8.
What is a feature of Cisco WLC and IPS synchronization?
9.
Which statement about Cisco Management Frame Protection is true?
10.
From which location can you run reports on endpoint profiling?