Question 361

Which two cryptographic algorithms are used with IPsec? {Choose two.)
  • Question 362

    Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?
  • Question 363

    An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints?
  • Question 364

    Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)
  • Question 365

    An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?