What must be done in order to ensure that the created is functioning as it should?

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file...

March 8, 2022 No Comments READ MORE +

What are two Trojan malware attacks? (Choose two.)

What are two Trojan malware attacks? (Choose two.)A . rootkitB . frontdoorC . smurfD . backdoorE . syncView AnswerAnswer: AD

March 8, 2022 No Comments READ MORE +

Which protocol accomplishes this goal?

An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence. Which protocol accomplishes this goal?A . AES-192B . IKEv1C . AES-256D . ESPView AnswerAnswer: D

March 8, 2022 No Comments READ MORE +

What must be done to ensure that all devices can communicate together?

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management port conflicts with other communications on the network and must be changed. What must be done to ensure that all devices can communicate together?A . Set the sftunnel to go through the Cisco FTC ....

March 8, 2022 No Comments READ MORE +

What is the reason for this failure?

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures. The configuration is created in the simple detection policy section, but it does not work. What is the reason for this failure?A . The administrator must upload the file instead of the hash for...

March 7, 2022 No Comments READ MORE +

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC

March 7, 2022 No Comments READ MORE +

Which type of encryption uses a public key and private Key?

Which type of encryption uses a public key and private Key?A . asymmetricB . symmetricC . linearD . nonlinearView AnswerAnswer: A

March 7, 2022 No Comments READ MORE +

What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?

What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA? A. Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Cisco WSA does not. B. Cisco CWS minimizes the load on the internal network and security infrastructure as compared to Cisco...

March 7, 2022 No Comments READ MORE +

What is the benefit of integrating cisco ISE with a MDM solution?

What is the benefit of integrating cisco ISE with a MDM solution?A . It provides the ability to update other applications on the mobile device.B . It provides compliance checks for access to the network.C . It provides the ability to add applications to the mobile device through Cisco ISE...

March 6, 2022 No Comments READ MORE +

How does Cisco Workload Optimization Manager help mitigate application performance issues?

How does Cisco Workload Optimization Manager help mitigate application performance issues?A . It deploys an AWS Lambda system.B . It automates resource resizing.C . It optimizes a flow path.D . it sets up a workload forensic score.View AnswerAnswer: B

March 6, 2022 No Comments READ MORE +