When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Content Category BlockingB . File AnalysisC . Security Category BlockingD . Application ControlView AnswerAnswer: C
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . ProfileB . TerminalC . urlD . self-signedView AnswerAnswer: A
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?A . BYOD onboardingB . Simple Certificate Enrollment ProtocolC . MAC authentication bypassD . client provisioningView AnswerAnswer: A
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...
What action would allow the attacker to gain access to machine 1 but not machine 2?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . overflowing the...
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?A . Cognitive Threat AnalyticsB . Cisco Talos IntelligenceC . Threat Intelligence DirectorD . Encrypted Traffic AnalyticsView AnswerAnswer: C
Which command is needed to enable this on the Cisco FTD?
Refer to the exhibit. An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMG. The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?A . configure manager add DONTRESOLVE kregistration...
which compliance status is shown when a configured posture policy requirement is not met?
which compliance status is shown when a configured posture policy requirement is not met?A . AuthonzedB . CompliantC . NoncompliantD . UnknownView AnswerAnswer: C
What is a characteristic of a bridge group in ASA Firewall transparent mode?
What is a characteristic of a bridge group in ASA Firewall transparent mode?A . It includes multiple interfaces and access rules between interfaces are customizable.B . It iS a Layer 3 segment and includes one port and customizable access rules,C . lt allows ARP traffic with a single access rule.D...
Which feature is supported when deploying Cisco ASAv within the AWS public cloud?
Which feature is supported when deploying Cisco ASAv within the AWS public cloud?A . multiple context modeB . user deployment of Layer3 networksC . clusteringD . lPv6View AnswerAnswer: B