Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...
Which API is used for Content Security?
Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D
Which form of attack is launched using botnets?
Which form of attack is launched using botnets?A . EIDDOSB . virusC . DDOSD . TCP floodView AnswerAnswer: C Explanation: A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them. Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such...
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission.B . The attack is fragmented into groups of 8 octets before transmission.C . Short synchronized bursts of traffic are used to disrupt TCP connections.D . Malformed...
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . SmurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...
What is the primary role of the Cisco Email Security Appliance?
What is the primary role of the Cisco Email Security Appliance?A . Mail Submission AgentB . Mail Transfer AgentC . Mail Delivery AgentD . Mail User AgentView AnswerAnswer: B Explanation: Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and...
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile.B . It defines a traffic baseline for traffic anomaly deduction.C . It inspects hosts that meet the profile with more intrusion rules.D . It blocks...
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . transparent modeB . routed modeC . inline modeD . active modeE . passive monitor-only modeView AnswerAnswer: CE Explanation: You can configure your ASA FirePOWER module using one of the following deployment models: You can configure your...