Question 106

Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.

Question 107

What is the function of the Context Directory Agent?
  • Question 108

    What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
  • Question 109

    An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransom ware infection? (Choose two)
  • Question 110

    Which form of attack is launched using botnets?