Which two deployment modes does the Cisco ASA FirePOWER module support? (Choose two.)
Correct Answer: C,E
Question 552
Which two key and block sizes are valid for AES? (Choose two)
Correct Answer: C,D
The AES encryption algorithm encrypts and decrypts data in blocks of 128 bits (block size). It can do this using 128-bit, 192-bit, or 256-bit keys
Question 553
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
Correct Answer: A
Spero analysis is a feature of Cisco AMP for Networks that examines structural characteristics such as metadata and header information in executable files. After generating a Spero signature based on this information, if the file is an eligible executable file, the device submits it to the Spero heuristic engine in the AMP cloud for analysis1. Spero analysis can detect malware based on the file's structure and behavior, without requiring a full file upload2. Spero analysis is different from dynamic analysis, sandbox analysis, and malware analysis, which are other features of Cisco AMP for Networks that perform different types of file inspection and analysis3. References: 1: How to configure Firepower AMP to not upload files to ... - Cisco Community 2: File Policies - Network Direction 3: Cisco AMP for Networks - Cisco
Question 554
What are two functions of IKEv1 but not IKEv2? (Choose two)
Correct Answer: B,E
Question 555
Refer to the exhibit. An engineer is implementing a certificate based VPN. What is the result of the existing configuration?
Correct Answer: B
The configuration snippet in the image is a part of IKEv2 configuration where the name mangler is associated with the organizational unit (OU) "MANGLER". In Cisco's IKEv2 implementation, this specific configuration means that only an IKEv2 peer whose certificate has an OU attribute set to "MANGLER" can establish an IKEv2 Security Association successfully. This is a method of ensuring that only peers with certificates issued to a specific organizational unit can connect, enhancing security by limiting unauthorized access. The name mangler is a feature that allows the administrator to specify a string that must be present in the peer's certificate for authentication. The name mangler can be applied to any certificate field, such as common name (CN), organization (O), or OU. The name mangler can also be used to modify the peer's identity based on the certificate field, such as appending or prepending a string to the identity. The name mangler is configured under the IKEv2 profile using the command crypto ikev2 profile profile-name identity name-mangler name-mangler-name dn field-name. In this case, the name mangler is applied to the OU field of the peer's certificate. The other options are incorrect because they do not describe the effect of the name mangler configuration. Option A is incorrect because the name mangler does not affect the identity matching for the IKEv2 authorization policy. The identity matching is based on the peer's identity type and value, which can be different from the certificate field. Option C is incorrect because the name mangler does not encrypt the OU field of the peer's certificate. The OU field is part of the certificate's subject, which is not encrypted in the IKEv2 messages. Option D is incorrect because the name mangler does not set the OU field of the peer's certificate. The OU field is determined by the certificate authority (CA) that issues the certificate, and the name mangler only verifies or modifies the peer's identity based on the OU field. References : Configuring Internet Key Exchange Version 2, Internet Key Exchange Version 2 CLI Constructs, Tutorial: Setting up a certificate-based IKEv2 VPN connection (RSA)