Which statement is true about VRF-lite implementation in a service provider network?
Question No. 3
Which three statements about communication between Cisco VSG and the VEM are true? (Choose three.)
Answer: A, D, E
Question No. 4
Which three statements about the SHA-2 algorithm are true? (Choose three.)
Answer: A, E, F
Question No. 5
On Nexus 9000, in Python interactive mode, which command is correctly used to disable an interface?
Question No. 6
Which two options are open-source SDN controllers? (choose two)
Answer: A, D
Question No. 7
All your employees must authenticate their devices to the network, be they company-owned or employee-owned assets, with ISE as the authentication server, i ne primary identity store used is Microsoft Active Directory, with username and password authentication. To ensure the security of your enterprise, your security policy dictates that only company owned assets get access to the enterprise network, while personal assets have restricted access. Which configuration allows you to enforce this policy using only ISE and Active Directory?
Question No. 8
Which protocol does ISE use to secure connection through the Cisco IronPort Tunnel infrastructure?
Question No. 9
Which file extensions are supported on the Firesight Management Center 6.1 file policies that can be
analyzed dynamically using the Threat Grid Sandbox integration?
Question No. 10
Which of the following IOS ipsec transform-set configuration provides both encryption and integrity protection?
Question No. 11
Which three policies are building blocks of vSmart architecture? (Choose three.)
Answer: A, D, F
Question No. 12
Which are the three remediation types that cannot be configured in stealth mode posture? (Choose three.)
Answer: A, C, D
Question No. 13
You are considering using RSPAN to capture traffic between several switches. Which two configuration
aspects do you need to consider? (Choose two.)
Answer: B, E
Question No. 14
Refer to the exhibit.
Question No. 15
Which two statements about MACsec are true? (Choose two)