Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?A . ESPB . AHC . IKEv1D . IKEv2View AnswerAnswer: A
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D
Why is it important to implement MFA inside of an organization?
Why is it important to implement MFA inside of an organization?A . To prevent man-the-middle attacks from being successful.B . To prevent DoS attacks from being successful.C . To prevent brute force attacks from being successful.D . To prevent phishing attacks from being successful.View AnswerAnswer: C
What are two features of NetFlow flow monitoring? (Choose two.)
What are two features of NetFlow flow monitoring? (Choose two.)A . Copies all ingress flow information to an interface.B . Include the flow record and the flow importer.C . Can track ingress and egress information.D . Can be used to track multicast, MPLS, or bridged traffic.E . Does not required...
Which threat involves software being used to gain unauthorized access to a computer system?
Which threat involves software being used to gain unauthorized access to a computer system?A . ping of deathB . HTTP floodC . virusD . NTP amplificationView AnswerAnswer: C
What must the administrator do to accomplish this?
A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?A . map SNMPv3 users to SNMP viewsB . set the password to be...
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?A . big dataB . storm centersC . sandboxingD . blocklistingView AnswerAnswer: C
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
Which attack is preventable by Cisco ESA but not by the Cisco WSA?A . buffer overflowB . DoSC . SQL injectionD . phishingView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-5/user_guide/b_ESA_Admin_Guide_13-5/m_advanced_phishing_protection.html
What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?A . Configure a Cisco FMC...
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?A . consumptionB . sharingC . analysisD . authoringView AnswerAnswer: A Explanation: