Which term describes this process?

Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats. Which term describes this process?A . deploymentB . consumptionC . authoringD . sharingView AnswerAnswer: A

March 9, 2022 No Comments READ MORE +

accomplish this goal?

An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?A . Cisco Defense OrchestratorB . Cisco SecureworksC . Cisco DNA CenterD . Cisco Configuration ProfessionalView AnswerAnswer: C

March 9, 2022 1 Comment READ MORE +

Which solution must be used for this implementation?

An organization wants to secure users, data and applications in the cloud. The solution must be API-based and operate as a cloud-native CASB. Which solution must be used for this implementation?A . Cisco Firepower Next-Generation FirewallB . Cisco Cloud Email SecurityC . Cisco UmbrellaD . Cisco Cloud lockView AnswerAnswer: D

March 9, 2022 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . registryB . bootloaderC . buffer modeD . user modeE . virtualView AnswerAnswer: CD

March 9, 2022 No Comments READ MORE +

Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container?

Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container?A . SDLCB . DockerC . LambdaD . ContivView AnswerAnswer: B

March 9, 2022 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Secure the connection between the web and the app tier.B . Use prepared statements and parameterized queries.C . Check integer, float, or Boolean string parameters to ensure accurate values.D . Block SQL code execution in the...

March 9, 2022 No Comments READ MORE +

Which solution would be best for this and why?

A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment. They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?A...

March 9, 2022 1 Comment READ MORE +

Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?

Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?A . Cisco TetrationB . Cisco ISEC . Cisco AMP for NetworkD . Cisco AnyConnectView AnswerAnswer: C

March 9, 2022 No Comments READ MORE +

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?A . BYOD on boarding.B . Simple Certificate Enrollment Protocol.C . Client provisioning.D . MAC authentication bypass.View AnswerAnswer: A Explanation: When supporting personal devices on a corporate network, you must protect...

March 8, 2022 No Comments READ MORE +

What is the function of the Context Directory Agent?

What is the function of the Context Directory Agent?A . reads the Active Directory logs to map IP addresses to usernamesB . accepts user authentication requests on behalf of Web Security Appliance for user identificationC . relays user authentication requests from Web Security Appliance to Active DirectoryD . maintains users'...

March 8, 2022 No Comments READ MORE +