Question 396

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?
  • Question 397

    A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
  • Question 398

    An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?
  • Question 399

    Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
  • Question 400

    Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling?