Question 116
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
Question 117
How does Cisco Umbrella archive logs to an enterprise owned storage?
Question 118
Drag and drop the descriptions from the left onto the encryption algorithms on the right.


Question 119
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
Question 120
What are two workloaded security models? (Choose two)

