which two methods?
IPsec peer authentication is typically implemented through which two methods? (Choose two.)
Which OSPF configuration should the administrator enable to prevent this kind of attack on routerA?
An OSPF router (routerA) on the network is running at an abnormally high CPU rate. Using various OSPF debug commands on routerA, the network administrator determines that routerA is receiving many OSPF link state packets from an unknown OSPF neighbor, thus forcing many OSPF path recalculations and affecting routerA’s CPU usage. Which OSPF configuration should the administrator enable to prevent this kind of attack on routerA?
which Cisco product can be used to provide endpoint-based trusted- traffic marking?
When implementing QoS, which Cisco product can be used to provide endpoint-based trusted- traffic marking?
Which platform has the highest IPsec throughput and can support the highest number of tunnels?
Which platform has the highest IPsec throughput and can support the highest number of tunnels?
Which algorithm is recommended for implementing automatic symmetric key exchange over an unsecured channel?
Which algorithm is recommended for implementing automatic symmetric key exchange over an unsecured channel?
which four functionalities?
Cisco SSL VPN solution uses the Cisco Secure Desktop to provide which four functionalities? (Choose four.)
Which three security components can be found in today’s typical single-tier firewall system?
Which three security components can be found in today’s typical single-tier firewall system? (Choose three.)
Which solution solves this problem?
When SSL uses TCP encapsulation on Cisco SSL VPNs, the user’s TCP session is transported over another TCP session, thus making flow control inefficient if a packet is lost. Which solution solves this problem?
Which two logical controls are available on Cisco lOS routers to limit the damage of physical intrusions?
Which two logical controls are available on Cisco lOS routers to limit the damage of physical intrusions? (Choose two.)
Which statement regarding the hybrid user authentication model for remote-access IPsec VPNs is correct?
Which statement regarding the hybrid user authentication model for remote-access IPsec VPNs is correct?