What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . SMTPB . pxGridC . STIXD . XMPPView AnswerAnswer: C
Which functions of an SDN architecture require southbound APIs to enable communication?
Which functions of an SDN architecture require southbound APIs to enable communication?A . management console and the cloudB . management console and the SDN controllerC . SDN controller and the cloudD . SDN controller and the network elementsView AnswerAnswer: D
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . DESC . RSAD . AESView AnswerAnswer: C
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . BindingB . ExchangeC . MitigatingD . Pull messagingE . CorrelationView AnswerAnswer: AD
Which option is the main function of Cisco Firepower impact flags?
Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They identify data that the ASA sends to the Firepower module.C . They correlate data about intrusions and vulnerability.D . They highlight known and suspected malicious IP addresses in reports.View...
Which form of attack is launched using botnets?
Which form of attack is launched using botnets?A . DDOSB . EIDDOSC . TCP floodD . virusView AnswerAnswer: A
Which VPN technology can support a multivendor environment and secure traffic between sites?
Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . Flex VPND . DMVPNView AnswerAnswer: B
What action is needed to authenticate the VPN?
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on host A. B. Enter the...
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D