What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . SMTPB . pxGridC . STIXD . XMPPView AnswerAnswer: C

November 10, 2021 No Comments READ MORE +

Which functions of an SDN architecture require southbound APIs to enable communication?

Which functions of an SDN architecture require southbound APIs to enable communication?A . management console and the cloudB . management console and the SDN controllerC . SDN controller and the cloudD . SDN controller and the network elementsView AnswerAnswer: D

November 10, 2021 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D

November 10, 2021 No Comments READ MORE +

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . DESC . RSAD . AESView AnswerAnswer: C

November 9, 2021 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two)

Which two capabilities does TAXII support? (Choose two)A . BindingB . ExchangeC . MitigatingD . Pull messagingE . CorrelationView AnswerAnswer: AD

November 9, 2021 No Comments READ MORE +

Which option is the main function of Cisco Firepower impact flags?

Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They identify data that the ASA sends to the Firepower module.C . They correlate data about intrusions and vulnerability.D . They highlight known and suspected malicious IP addresses in reports.View...

November 9, 2021 No Comments READ MORE +

Which form of attack is launched using botnets?

Which form of attack is launched using botnets?A . DDOSB . EIDDOSC . TCP floodD . virusView AnswerAnswer: A

November 8, 2021 No Comments READ MORE +

Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . Flex VPND . DMVPNView AnswerAnswer: B

November 8, 2021 1 Comment READ MORE +

What action is needed to authenticate the VPN?

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on host A. B. Enter the...

November 7, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D

November 7, 2021 No Comments READ MORE +