Question 161

What are two functions of secret key cryptography? (Choose two)
  • Question 162

    An email administrator is setting up a new Cisco ESA.
    The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?
  • Question 163

    An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
  • Question 164

    Which two behavioral patterns characterize a ping of death attack? (Choose two)
  • Question 165

    An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the...... use takes precedence over the second one?