How would this be accomplished?

An administrator is configuring a DHCP server to better secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?A . Set a trusted interface for the DHCP server.B . Set the DHCP snooping bit to...

February 27, 2022 No Comments READ MORE +

What is the benefit of installing Cisco AMP for Endpoints on a network?

What is the benefit of installing Cisco AMP for Endpoints on a network?A . It provides operating system patches on the endpoints for security.B . It provides flow-based visibility for the endpoints network connections.C . It enables behavioral analysis to be used for the endpoints.D . It protects endpoint systems...

February 27, 2022 No Comments READ MORE +

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?A . file access from a different userB . interesting file accessC . user login suspicious behaviorD . privilege escalationView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetrationanalytics/whitepaper-c11-740380.html

February 26, 2022 No Comments READ MORE +

Which algorithm is an NGE hash function?

Which algorithm is an NGE hash function?A . HMACB . SHA-1C . MD5D . SHA-2View AnswerAnswer: D

February 26, 2022 No Comments READ MORE +

Which action accomplishes this task?

An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?A . Configure Cisco DUO with the external Active Directory connector and tie it to...

February 26, 2022 No Comments READ MORE +

Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?

Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?A . orchestrationB . CI/CD pipelineC . containerD . securityView AnswerAnswer: B

February 26, 2022 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two)

Which two capabilities does TAXII support? (Choose two)A . BindingB . ExchangeC . MitigatingD . Pull messagingE . CorrelationView AnswerAnswer: AD

February 26, 2022 No Comments READ MORE +

What is the difference between a vulnerability and an exploit?

What is the difference between a vulnerability and an exploit?A . A vulnerability is a hypothetical event for an attacker to exploit.B . A vulnerability is a weakness that can be exploited by an attacker.C . An exploit is a weakness that can cause a vulnerability in the network.D ....

February 26, 2022 No Comments READ MORE +

What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?

What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?A . Telemetry uses a pull, method which makes it more reliable than SNMC . Telemetry uses push and pull, which makes it more scalable than SNME . Telemetry uses a push method which makes...

February 26, 2022 No Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two)

Which two descriptions of AES encryption are true? (Choose two)A . AES is more secure than 3DEC . AES can use a 168-bit key for encryption.D . AES can use a 256-bit key for encryption.E . AES encrypts and decrypts a key three times in sequence.F . AES is less...

February 26, 2022 No Comments READ MORE +