Which ASA deployment mode meets these needs?

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance . Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C

July 28, 2021 No Comments READ MORE +

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?A . health policyB . system policyC . correlation policyD . access control policyE . health awareness policyView AnswerAnswer: A

July 27, 2021 No Comments READ MORE +

What is a difference between FlexVPN and DMVPN?

What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C

July 27, 2021 No Comments READ MORE +

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)A . Enable NetFlow Version 9.B . Create an ACL to allow UDP traffic on port 9996.C . Apply NetFlow Exporter to the outside interface in the inbound direction.D . Create a class map to match interesting...

July 27, 2021 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

July 27, 2021 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Check integer, float, or Boolean string parameters to ensure accurate values.B . Use prepared statements and parameterized queries.C . Secure the connection between the web and the app tier.D . Write SQL code instead of using...

July 27, 2021 No Comments READ MORE +

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)A . configure Active Directory Group Policies to push proxy settingsB . configure policy-based routing on the network infrastructureC . reference a Proxy Auto Config fileD . configure the proxy IP address...

July 26, 2021 1 Comment READ MORE +

What is a result of the configuration?

Refer to the exhibit . What is a result of the configuration?A . Traffic from the DMZ network is redirectedB . Traffic from the inside network is redirectedC . All TCP traffic is redirectedD . Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: The purpose of...

July 26, 2021 No Comments READ MORE +

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . Group PolicyB . Access Control PolicyC . Device Management PolicyD . Platform Service PolicyView AnswerAnswer: D Explanation: Cisco...

July 26, 2021 No Comments READ MORE +

What is the primary benefit of deploying an ESA in hybrid mode?

What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environmentB . It provides the lowest total cost of ownership by reducing the need for physical appliancesC . It provides maximum...

July 26, 2021 No Comments READ MORE +