Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect against input validation and character escapes in the endpoint.D . Install a spam and virus...
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport mechanism (data exchange) of cyber threat intelligence...
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)A . It can handle explicit HTTP requests.B . It requires a PAC file for the client web browser.C . It requires a proxy for the client web browser.D . WCCP v2-enabled devices can automatically redirect...
What does the API do when connected to a Cisco security appliance?
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . get the process and PID information from the computers in the networkB . create an SNMP pull mechanism for managing AMPC . gather network telemetry information from AMP for endpointsD . gather the...
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: DE Explanation: Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based email...
Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?
Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?A . configure system add <host><key>B . configure manager <key> add hostC . configure manager deleteD . configure manager add <host><key>View AnswerAnswer: D
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events.B . It provides stateless IP flow tracking that exports all records of a specific flow.C . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwordsB . Data loss preventionC . Heuristic-based filteringD . Geolocation-based filteringE . NetFlowView AnswerAnswer: BD Explanation: Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email encryption,...
Which two mechanisms are used to control phishing attacks? (Choose two)
Which two mechanisms are used to control phishing attacks? (Choose two)A . Enable browser alerts for fraudulent websites.B . Define security group memberships.C . Revoke expired CRL of the websites.D . Use antispyware software.E . Implement email filtering techniques.View AnswerAnswer: AE
What action is needed to authenticate the VPN?
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB . What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on hostA. B. Enter the command with...