About Us

QUESTION 36
Which two statements about MACSec are true?(two)
A. It can be enabled on individual ports at Layer 3 to allow MACsec devices to access the network.
B. It encrypts packets at Layer 3, which allows devices to handle packets in accordance with network policies.
C. It maintains network intelligence as it is applied to router uplinks and downlinks.
D. It users symmetric-key encyption to protect data confidentiality.
E. It can use IEEE 802.1x master keys to encrypt wired and wireless links.
F. It works in conjunction with IEEE 802.1x – 2010 prot-based access control.
Correct Answer: DF
QUESTION 37
Refer to the exhibit. You issued the show crypto isakmp sa command to troubleshoot a connection failure on an IPsec VPN, what possible issue does the given output indicate?
ASA# show crypto isakmp saype: LZL
Active SA: 1
Rekey SA: 0 (a tunnel will report 1 Active and 1 rekey SA during rekey)
IKE peer: 192.168.10.10
Rekey: BB
Role: initiator
A. The pre-shared keys are mismatched.
B. The peer is failing to respond.
C. The transform sets are mismatched.
D. The crypto ACLs are mismatched.
Correct Answer: A

 

QUESTION 38
Refer to the exhibit. What IPsec function does the given debug output demonstrate?
A. setting SPIs to pass traffic
B. DH exchange initiation
C. crypto ACL confirmation
D. PFS parameter negotiation
Correct Answer: C
QUESTION 39
Which three of these make use of a certificate as part of the protocol?(three)
A. EAP-MDS
B. EAP-PEAP
C. EAP-TLS
D. LEAP
E. EAP-FAST
F. EAP-TTLS
Correct Answer: BCF