Which two technologies are considered to be Suite B cry…

Which two technologies are considered to be Suite B cryptography? (Choose two.)

Which two technologies are considered to be Suite B cryptography? (Choose two.)

A.
MD5

B.
SHA2

C.
Elliptical Curve Diffie-Hellman

D.
3DES

E.
DES



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Lenia

Lenia

QUESTION
You have deployed new Cisco AnyConnect start before logon modules and set the configuration to download modules before logon, but all client connections continue to use the previous version of the module. Which action must you take to correct the problem?

A. Configure start before logon in the client profile.
B. Configure a group policy to prompt the user to download the updated module.
C. Define the modules for download in the client profile.
D. Define the modules for download in the group policy.

Answer: A

QUESTION
Which feature do you include in a highly available system to account for potential site failures?

A. geographical separation of redundant devices
B. hot/standby failover pairs
C. Cisco ACE load-balancing with VIP
D. dual power supplies

Answer: A

QUESTION
Refer to the exhibit. Which VPN solution does this configuration represent?

A. DMVPN
B. GETVPN
C. FlexVPN
D. site-to-site

Answer: B

QUESTION
Which VPN type can be used to provide secure remote access from public internet cafes and airport kiosks?

A. site-to-site
B. business-to-business
C. Clientless SSL
D. DMVPN

Answer: C

QUESTION
Refer to the exhibit. Which VPN solution does this configuration represent?

A. Cisco AnyConnect (IKEv2)
B. site-to-site
C. DMVPN
D. SSL VPN

Answer: D

QUESTION
What must be enabled in the web browser of the client computer to support Clientless SSL VPN?

A. cookies
B. ActiveX
C. Silverlight
D. popups

Answer: A

QUESTION
Which VPN feature allows remote access clients to print documents to local network printers?

A. Reverse Route Injection
B. split tunneling
C. loopback addressing
D. dynamic virtual tunnels

Answer: B

QUESTION
Which option is most effective at preventing a remote access VPN user from bypassing the corporate transparent web proxy?

A. using the proxy-server settings of the client computer to specify a PAC file for the client computer to download
B. instructing users to use the corporate proxy server for all web browsing
C. disabling split tunneling
D. permitting local LAN access

Answer: C

QUESTION
Which option is an example of an asymmetric algorithm?

A. 3DES
B. IDEA
C. AES
D. RSA

Answer: D