What is managed by Cisco Security Manager?
What is managed by Cisco Security Manager?A . Cisco ASAB . Cisco WLCC . Cisco WSAD . Cisco ESAView AnswerAnswer: A
What are two DDoS attack categories? (Choose two)
What are two DDoS attack categories? (Choose two)A . sequentialB . protocolC . databaseD . volume-basedE . scree-basedView AnswerAnswer: BD
What is the function of the Context Directory Agent?
What is the function of the Context Directory Agent?A . maintains users' group membershipsB . relays user authentication requests from Web Security Appliance to Active DirectoryC . reads the Active Directory logs to map IP addresses to usernamesD . accepts user authentication requests on behalf of Web Security Appliance for...
After enabling the AVC engine, what must be done to implement this?
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?A . Use security services to configure the traffic...
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?A . Cisco AnyConnectB . Cisco TalosC . Cisco Dynamic DNSD . Cisco AMPView AnswerAnswer: B
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Vulnerabilities and ExposuresB . Common Exploits and VulnerabilitiesC . Common Security ExploitsD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: A
Which actions must be performed in order to provide this capability?
organization has a Cisco ESA set up with policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation. Which actions must be performed in order to provide...
What are two rootkit types? (Choose two.)
What are two rootkit types? (Choose two.)A . user modeB . bootloaderC . virtualD . registryE . buffer modeView AnswerAnswer: AB
How does Cisco Advanced Phishing Protection protect users?
How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It uses machine learning and real-time behavior analytics.E . It utilizes sensors that send messages securely.View AnswerAnswer: C
A network administrator configures command authorization for the admin5 user What is the admin5 user able to do on HQ_Router after this configuration?
Refer to the exhibit. A network administrator configures command authorization for the admin5 user What is the admin5 user able to do on HQ_Router after this configuration?A . complete no configurationsB . add subinterfacesC . complete all configurationsD . set the IP address of an interfaceView AnswerAnswer: A