Question 16

What is the function of SDN southbound API protocols?
  • Question 17

    What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
  • Question 18

    An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
  • Question 19

    Which algorithm provides encryption and authentication for data plane communication?
  • Question 20

    What are the two types of managed Intercloud Fabric deployment models? (Choose two)