Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Secure the connection between the web and the app tier.B . Use prepared statements and parameterized queries.C . Check integer, float, or Boolean string parameters to ensure accurate values.D . Block SQL code execution in the...

October 28, 2021 No Comments READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D

October 27, 2021 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . URL FilteringC . Impact FlagsD . Health MonitoringView AnswerAnswer: C

October 27, 2021 No Comments READ MORE +

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . routed modeB . active modeC . transparent modeD . inline modeE . passive monitor-only modeView AnswerAnswer: DE

October 27, 2021 No Comments READ MORE +

Which type of attack is social engineering?

Which type of attack is social engineering?A . trojanB . malwareC . phishingD . MITMView AnswerAnswer: C

October 27, 2021 No Comments READ MORE +

Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C Explanation: FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with...

August 8, 2021 No Comments READ MORE +

Which technology is used to improve web traffic performance by proxy caching?

Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A

August 7, 2021 No Comments READ MORE +

What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...

August 7, 2021 No Comments READ MORE +

Where must the ASA be added on the Cisco UC Manager platform?

The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A

August 7, 2021 No Comments READ MORE +

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . controlB . malwareC . URL filteringD . protectView AnswerAnswer: D

August 6, 2021 No Comments READ MORE +