Question 56

An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
  • Question 57

    Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.

    Question 58

    An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not
    64 characters and is non-zero. What is the issue?
  • Question 59

    What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
  • Question 60

    Drag and drop the VPN functions from the left onto the description on the right.