100%(1)1 out of 1 people found this document helpful
This preview shows page 13 - 17 out of 49 pages.
There are (factor and example):Time(access in time range), Knowledge (password), Location (access from different locations),Possession (token), Inherence (fingerprints) factors:QUESTION 28DRAG DROPDrag and drop the capabilities from the left onto the correct technologies on the right.Select and Place:Correct Answer: ExplanationExplanation/Reference:
ahmdkhaldd @ certcollection.orgQUESTION 29Which two key and block sizes are valid for AES? (Choose two.)A.64-bit block size, 112-bit key lengthB.64-bit block size, 168-bit key lengthC.128-bit block size, 192-bit key lengthD.128-bit block size, 256-bit key lengthE.192-bit block size, 256-bit key lengthCorrect Answer: CDExplanationExplanation/Reference:-128-bit block size, 192-bit key length-128-bit block size, 256-bit key lengthReference: QUESTION 30How does Cisco Umbrella archive logs to an enterprise owned storage?A.by using the Application Programming Interface to fetch the logsB.by sending logs via syslog to an on-premises or cloud-based syslog serverC.by the system administrator downloading the logs from the Cisco Umbrella web portalD.by being configured to send logs to a self-managed AWS S3 bucketCorrect Answer: DExplanation
ahmdkhaldd @ certcollection.orgExplanation/Reference:-by being configured to send logs to a self-managed AWS S3 bucketReference: QUESTION 31In which cloud services model is the tenant responsible for virtual machine OS patching?A. IaaSB. UCaaSC. PaaSD. SaaSCorrect Answer: AExplanationExplanation/Reference:-IaaSReference: -how-microsoft-office-365-azure-fit-in-021672.phpQUESTION 32Which two descriptions of AES encryption are true? (Choose two.)A.AES is less secure than 3DES.B.AES is more secure than 3DES.C.AES can use a 168-bit key for encryption.D.AES can use a 256-bit key for encryption.E.AES encrypts and decrypts a key three times in sequence.Correct Answer: BDExplanationExplanation/Reference:-AES is more secure than 3DES.-AES can use a 256-bit key for encryption.Reference: QUESTION 33Which technology is used to improve web traffic performance by proxy caching?A. WSAB. FirepowerC. FireSIGHTD. ASACorrect Answer: AExplanationExplanation/Reference:WSAQUESTION 34
ahmdkhaldd @ certcollection.orgWhich statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A.To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B. A sysopt command can be used to enable NSEL on a specific interface.