Two answers ware related to hierarchy:
I had the “nested” question (wording has been different). Two answers ware related to hierarchy:
which type of Layer 2 attack can you intercept traffic …
With which type of Layer 2 attack can you intercept traffic that is destined for one host?
With which technology do apply integrity, confidentiall…
With which technology do apply integrity, confidentially and authenticate the source
Which type of attack is directed against the network di…
Which type of attack is directed against the network directly:
What does the key length represent
What does the key length represent
Where OAKLEY and SKEME come to play?
Where OAKLEY and SKEME come to play? (on the exam the question asked about inside ISAKM protocol)
What show command can see vpn tunnel establish with tra…
What show command can see vpn tunnel establish with traffic passing through.
Which filter uses in Web reputation to prevent from web…
Which filter uses in Web reputation to prevent from web based attackts (somthing similar)?
Diffie-Hellman key exchange question
Diffie-Hellman key exchange question
Which port should (or would) be open if VPN NAT-T was e…
Which port should (or would) be open if VPN NAT-T was enabled