What are the three authentication methods that you can use during IKE Phase 1?
In IKE phasel, IKE creates an authenticated, secure channel between the two IKE peers, called
the IKE security association. The Diffie-Hellman key agreement is always performed in this phase.
What are the three authentication methods that you can use during IKE Phase 1? (Choose three,)
which required option, could be downloaded from Cisco.com?
While using 5.x signatures to enable Cisco IOS IPS, which required option, could be downloaded
from Cisco.com?
what action is taken?
If the Hardware Client cannot contact a backup server, what action is taken?
How do you configure the PIX Firewall to protect against SYN floods?
How do you configure the PIX Firewall to protect against SYN floods?
What status is shown when an Agent kit is prepared for downloading to hosts?
What status is shown when an Agent kit is prepared for downloading to hosts?
Which three keywords are used with the dotlx port-control command?
You wish to configure 802.IX port control on your switch. Which three keywords are used with the
dotlx port-control command? (Choose three.)
Which regular expression should be created to match the .exe file extension?
You work as the network administrator for your company. Now, you are asked to configure the
Cisco ASA security appliance, using Modular Policy Framework to prevent executables with the
.exe file extension from being downloaded. Which regular expression should be created to match
the .exe file extension?
Choose three.
Choose three parameters sent from the Cisco VPN Concentrator to the remote Cisco VPN Client
during tunnel establishment. Choose three.
What information can be displayed by issuing the command show zone-pair security?
What information can be displayed by issuing the command show zone-pair security?
Which attack could an attacker use during the propagate phase of an attack?
Which attack could an attacker use during the propagate phase of an attack?