Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?

Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?A . ESPB . AHC . IKEv1D . IKEv2View AnswerAnswer: A

March 6, 2022 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D

March 6, 2022 No Comments READ MORE +

Why is it important to implement MFA inside of an organization?

Why is it important to implement MFA inside of an organization?A . To prevent man-the-middle attacks from being successful.B . To prevent DoS attacks from being successful.C . To prevent brute force attacks from being successful.D . To prevent phishing attacks from being successful.View AnswerAnswer: C

March 5, 2022 No Comments READ MORE +

What are two features of NetFlow flow monitoring? (Choose two.)

What are two features of NetFlow flow monitoring? (Choose two.)A . Copies all ingress flow information to an interface.B . Include the flow record and the flow importer.C . Can track ingress and egress information.D . Can be used to track multicast, MPLS, or bridged traffic.E . Does not required...

March 5, 2022 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . ping of deathB . HTTP floodC . virusD . NTP amplificationView AnswerAnswer: C

March 5, 2022 No Comments READ MORE +

What must the administrator do to accomplish this?

A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?A . map SNMPv3 users to SNMP viewsB . set the password to be...

March 5, 2022 No Comments READ MORE +

Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?

Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?A . big dataB . storm centersC . sandboxingD . blocklistingView AnswerAnswer: C

March 4, 2022 No Comments READ MORE +

Which attack is preventable by Cisco ESA but not by the Cisco WSA?

Which attack is preventable by Cisco ESA but not by the Cisco WSA?A . buffer overflowB . DoSC . SQL injectionD . phishingView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-5/user_guide/b_ESA_Admin_Guide_13-5/m_advanced_phishing_protection.html

March 4, 2022 No Comments READ MORE +

What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?A . Configure a Cisco FMC...

March 3, 2022 No Comments READ MORE +

Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?A . consumptionB . sharingC . analysisD . authoringView AnswerAnswer: A Explanation:

March 3, 2022 No Comments READ MORE +