Which product should be used to meet these requirements?

An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?A . Cisco UmbrellaB . Cisco AMPC ....

March 2, 2022 No Comments READ MORE +

What is a difference between GETVPN and iPsec?

What is a difference between GETVPN and iPsec?A . GETVPN provides key management and security association management.B . GETVPN reduces latency and provides encryption over MPLS without the use of a central hub.C . GETVPN is based on IKEv2 and does not support IKEv1.D . GETVPN is used to build...

March 2, 2022 No Comments READ MORE +

What must be done on the Cisco WSA to support these requirements?

An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users....

March 1, 2022 No Comments READ MORE +

Which portion of the network do EPP solutions solely focus on and EDR solutions do not?

Which portion of the network do EPP solutions solely focus on and EDR solutions do not?A . server farmB . perimeterC . coreD . East-West gatewaysView AnswerAnswer: B

March 1, 2022 No Comments READ MORE +

Which type of attack is social engineering?

Which type of attack is social engineering?A . trojanB . malwareC . phishingD . MITMView AnswerAnswer: C

March 1, 2022 No Comments READ MORE +

What are two advantages of using Cisco Any connect over DMVPN? (Choose two.)

What are two advantages of using Cisco Any connect over DMVPN? (Choose two.)A . It provides spoke-to-spoke communications without traversing the hub.B . It allows different routing protocols to work over the tunnel.C . It allows customization of access policies based on user identity.D . it allows multiple sites to...

March 1, 2022 No Comments READ MORE +

What is a benefit of conducting device compliance checks?

What is a benefit of conducting device compliance checks?A . It indicates what type of operating system is connecting to the network.B . It validates if anti-virus software is installed.C . It scans endpoints to determine if malicious activity is taking place.D . It detects email phishing attacks.View AnswerAnswer: B

March 1, 2022 No Comments READ MORE +

What must be done to meet these requirements?

An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?A . Implement pre-filter policies for the CIP preprocessor.B . Enable traffic analysis in the Cisco FTD . Configure intrusion...

March 1, 2022 1 Comment READ MORE +

What is a benefit of performing device compliance?

What is a benefit of performing device compliance?A . providing multi-factor authenticationB . device classification and authorizationC . providing attribute-driven policiesD . verification of the latest OS patchesView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/products/collateral/security/identity-servicesengine/data_sheet_c78-656174.html

March 1, 2022 No Comments READ MORE +

In an IaaS cloud services model, which security function is the provider responsible for managing?

In an IaaS cloud services model, which security function is the provider responsible for managing?A . Internet proxyB . firewalling virtual machinesC . CASBD . hypervisor OS hardeningView AnswerAnswer: D Explanation: Infrastructure as a Service (IaaS) in cloud computing is one of the most significant and fastest growing field. In...

February 28, 2022 No Comments READ MORE +