There are factor and example Timeaccess in time range Knowledge password

There are factor and example timeaccess in time range

This preview shows page 13 - 17 out of 49 pages.

There are (factor and example): Time(access in time range), Knowledge (password), Location (access from different locations), Possession (token), Inherence (fingerprints) factors: QUESTION 28 DRAG DROP Drag and drop the capabilities from the left onto the correct technologies on the right. Select and Place: Correct Answer: Explanation Explanation/Reference:
Image of page 13
ahmdkhaldd @ certcollection.org QUESTION 29 Which two key and block sizes are valid for AES? (Choose two.) A. 64-bit block size, 112-bit key length B. 64-bit block size, 168-bit key length C. 128-bit block size, 192-bit key length D. 128-bit block size, 256-bit key length E. 192-bit block size, 256-bit key length Correct Answer: CD Explanation Explanation/Reference: -128-bit block size, 192-bit key length -128-bit block size, 256-bit key length Reference: QUESTION 30 How does Cisco Umbrella archive logs to an enterprise owned storage? A. by using the Application Programming Interface to fetch the logs B. by sending logs via syslog to an on-premises or cloud-based syslog server C. by the system administrator downloading the logs from the Cisco Umbrella web portal D. by being configured to send logs to a self-managed AWS S3 bucket Correct Answer: D Explanation
Image of page 14
ahmdkhaldd @ certcollection.org Explanation/Reference: -by being configured to send logs to a self-managed AWS S3 bucket Reference: QUESTION 31 In which cloud services model is the tenant responsible for virtual machine OS patching? A. IaaS B. UCaaS C. PaaS D. SaaS Correct Answer: A Explanation Explanation/Reference: -IaaS Reference: - how-microsoft-office-365-azure-fit-in-021672.php QUESTION 32 Which two descriptions of AES encryption are true? (Choose two.) A. AES is less secure than 3DES. B. AES is more secure than 3DES. C. AES can use a 168-bit key for encryption. D. AES can use a 256-bit key for encryption. E. AES encrypts and decrypts a key three times in sequence. Correct Answer: BD Explanation Explanation/Reference: -AES is more secure than 3DES. -AES can use a 256-bit key for encryption. Reference: QUESTION 33 Which technology is used to improve web traffic performance by proxy caching? A. WSA B. Firepower C. FireSIGHT D. ASA Correct Answer: A Explanation Explanation/Reference: WSA QUESTION 34
Image of page 15
ahmdkhaldd @ certcollection.org Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true? A. To view bandwidth usage for NetFlow records, the QoS feature must be enabled. B. A sysopt command can be used to enable NSEL on a specific interface.
Image of page 16
Image of page 17

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture