Question 31
            
                    
                    
Which two descriptions of AES encryption are true? (Choose two.)
                        
                        
                        
                            
                                A. AES is less secure than 3DES. 
                            
                            
                        
                        
                        
                            
                                B. AES is more secure than 3DES. 
                            
                            
                        
                        
                        
                            
                                C. AES can use a 168-bit key for encryption. 
                            
                            
                        
                        
                        
                            
                                D. AES can use a 256-bit key for encryption. 
                            
                            
                        
                        
                        
                            
                                E. AES encrypts and decrypts a key three times in sequence. 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 32
            
                    
                    
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. STIX 
                            
                            
                        
                        
                        
                            
                                B. XMPP 
                            
                            
                        
                        
                        
                            
                                C. pxGrid 
                            
                            
                        
                        
                        
                            
                                D. SMTP 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 33
            
                    
                    DRAG DROP -Drag and drop the descriptions from the left onto the correct protocol versions on the right.Select and Place:
                        
                         
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                 
                            
                            
                                 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 34
            
                    
                    
Which VPN technology can support a multivendor environment and secure traffic between sites?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. SSL VPN 
                            
                            
                        
                        
                        
                            
                                B. GET VPN 
                            
                            
                        
                        
                        
                            
                                C. FlexVPN Most Voted 
                            
                            
                        
                        
                        
                            
                                D. DMVPN 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 35
            
                    
                    
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. DMVPN 
                            
                            
                        
                        
                        
                            
                                B. FlexVPN 
                            
                            
                        
                        
                        
                            
                                C. IPsec DVTI 
                            
                            
                        
                        
                        
                            
                                D. GET VPN 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
	
     
     
            
            Question 36
            
                    
                    
What is a commonality between DMVPN and FlexVPN technologies?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. FlexVPN and DMVPN use the new key management protocol, IKEv2 
                            
                            
                        
                        
                        
                            
                                B. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes 
                            
                            
                        
                        
                        
                            
                                C. IOS routers run the same NHRP code for DMVPN and FlexVPN 
                            
                            
                        
                        
                        
                            
                                D. FlexVPN and DMVPN use the same hashing algorithms 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 37
            
                    
                    
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. DTLSv1 
                            
                            
                        
                        
                        
                            
                                B. TLSv1 
                            
                            
                        
                        
                        
                            
                                C. TLSv1.1 
                            
                            
                        
                        
                        
                            
                                D. TLSv1.2 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 38
            
                    
                    
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Talos 
                            
                            
                        
                        
                        
                            
                                B. PSIRT 
                            
                            
                        
                        
                        
                            
                                C. SCIRT 
                            
                            
                        
                        
                        
                            
                                D. DEVNET 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 39
            
                    
                    
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Common Vulnerabilities, Exploits and Threats 
                            
                            
                        
                        
                        
                            
                                B. Common Vulnerabilities and Exposures 
                            
                            
                        
                        
                        
                            
                                C. Common Exploits and Vulnerabilities 
                            
                            
                        
                        
                        
                            
                                D. Common Security Exploits 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 40
            
                    
                    
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. accounting 
                            
                            
                        
                        
                        
                            
                                B. assurance 
                            
                            
                        
                        
                        
                            
                                C. automation 
                            
                            
                        
                        
                        
                            
                                D. authentication 
                            
                            
                        
                        
                        
                            
                                E. encryption