Which type of attack is social engineering?

Which type of attack is social engineering?A . trojanB . phishingC . malwareD . MITMView AnswerAnswer: B Explanation: Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company...

August 3, 2021 No Comments READ MORE +

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)A . packet decoderB . SIPC . modbusD . inline normalizationE . SSLView AnswerAnswer: BE Explanation: Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application layer...

August 3, 2021 No Comments READ MORE +

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist CenterB . File Reputation CenterC . AMP Reputation CenterD . IP and Domain Reputation CenterView AnswerAnswer: D Explanation: Talos’ IP and Domain Data Center is the world’s most comprehensive...

August 3, 2021 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A Explanation: The data plane of any network is responsible for handling data packets that are transported across the network. (The data plane is also sometimes called the forwarding plane.) Maybe...

August 3, 2021 No Comments READ MORE +

Which ASA deployment mode can provide separation of management on a shared appliance?

Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone modeB . transparent firewall modeC . multiple context modeD . routed modeView AnswerAnswer: C

August 2, 2021 No Comments READ MORE +

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B

August 2, 2021 No Comments READ MORE +

Which statement about IOS zone-based firewalls is true?

Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D

August 2, 2021 No Comments READ MORE +

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?A . It decrypts HTTPS application traffic for unauthenticated users.B . It alerts users when the WSA decrypts their traffic.C . It decrypts HTTPS application traffic for authenticated users.D . It provides enhanced HTTPS application...

August 2, 2021 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D Explanation: A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program...

August 2, 2021 No Comments READ MORE +

Which two preventive measures are used to control cross-site scripting? (Choose two)

Which two preventive measures are used to control cross-site scripting? (Choose two)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...

August 2, 2021 No Comments READ MORE +