What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is...

March 3, 2022 No Comments READ MORE +

What must be done to resolve this issue?

An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done...

March 3, 2022 No Comments READ MORE +

Which two mechanisms are used to control phishing attacks? (Choose two)

Which two mechanisms are used to control phishing attacks? (Choose two)A . Use antispyware softwareB . Implement email filtering techniques.C . Revoke expired CRL of the websites.D . Enable browser alerts for fraudulent websites.E . Define security group memberships.View AnswerAnswer: BD

March 3, 2022 No Comments READ MORE +

What is a difference between a DoS attack and a DDoS attack?

What is a difference between a DoS attack and a DDoS attack?A . A DoS attack is where a computer is used to flood a server with UDP packets whereas a DDoS attack is where a computer is used to flood a server with TCP packets.B . A DoS attack...

March 3, 2022 No Comments READ MORE +

How is data sent out to the attacker during a DNS tunneling attack?

How is data sent out to the attacker during a DNS tunneling attack?A . as part of the UDP'53 packet payloadB . as part of the domain nameC . as part of the TCP/53 packet headerD . as part of the DNS response packetView AnswerAnswer: B

March 2, 2022 No Comments READ MORE +

Which solution meets these requirements?

An organization wants to implement a cloud-delivered and SaaS-based solution to provide visibility and threat detection across the AWS network. The solution must be deployed without software agents and rely on AWS VPC flow logs instead. Which solution meets these requirements?A . Cisco Stealthwatch CloudB . Cisco UmbrellaC . NetFlow...

March 2, 2022 No Comments READ MORE +

In which two ways does Easy Connect help control network access when used with Cisco TrustSec?(Choose two.)

In which two ways does Easy Connect help control network access when used with Cisco TrustSec?(Choose two.)A . It allows multiple security products to share information and work together to enhance security posture in the network.B . It creates a dashboard in Cisco ISE that provides full visibility of all...

March 2, 2022 No Comments READ MORE +

What is a capability of Cisco ASA Netflow?

What is a capability of Cisco ASA Netflow?A . It sends NetFlow data records from active and standby ASAs in an active standby failover pair.B . It filters NSEL events based on traffic.C . It logs ll event types only to the same collector.D . It generates NSEL events even...

March 2, 2022 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)A . Malformed packets are used to crash systems.B . The attack is fragmented into groups of 8 octets before transmission.C . The attack is fragmented into groups of 16 octets before transmission.D . Publicly accessible DNS servers are...

March 2, 2022 No Comments READ MORE +

Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two.)

Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two.)A . Application monitors for power utilization of devices and loT sensors.B . Upgrade software on switches and routers.C . Automatically deploy new virtual routers.D . Connect to Information Technology Service Management Platforms.E . Create new SSIDs...

March 2, 2022 No Comments READ MORE +