What are the two different modes in which Private AMP cloud can be deployed? (Choose two.)
Answer : AC
Reference:
http://www.cisco.com/c/en/us/products/collateral/security/fireamp-private-cloud-virtual-appliance/datasheet-c78-733180.html
View the Exhibit.
Answer : BD
Explanation:
Which three commands can you use to configure VXLAN on a Cisco ASA firewall? (Choose three.)
Answer : ADF
Explanation:
Which Cisco ISE profiler service probe can collect information about Cisco Discovery Protocol?
Answer : F
Explanation:
Which type of attack uses a large number of spoofed MAC addresses to emulate wireless clients?
Answer : A
Explanation:
DoS attacks against access points are typically carried out on the basis of the following assumptions:
-> Access points have limited resources. For example, the per-client association state table.
-> WLAN management frames and authentication protocols 802.11 and 802.1x have no encryption mechanisms.
Wireless intruders can exhaust access point resources, most importantly the client association table, by emulating large number of wireless clients with spoofed
MAC addresses. Each one of these emulated clients attempts association and authentication with the target access point but leaves the protocol transaction mid- way. When the access points resources and the client association table is filled up with these emulated clients and their incomplete authentication states, legitimate clients can no longer be serviced by the attacked access point. This creates a denial of service attack.
Reference:
http://www.cisco.com/c/en/us/td/docs/wireless/mse/8-0/MSE_wIPS/MSE_wIPS_8_0/
MSE_wIPS_7_5_appendix_0110.html#concept_E6770BF8F43241919859C16AE0077137