how does DNS Tunneling exfiltrate data?

how does DNS Tunneling exfiltrate data?A . An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domainB . An attacker opens a reverse DNS shell to get into the client's system and install malware on itC . An attacker...

May 23, 2021 No Comments READ MORE +

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)A . command and control communicationB . intelligent proxyC . data exfiltrationD . URL categorizationE . snortView AnswerAnswer: AC

May 23, 2021 No Comments READ MORE +

What is causing this problem?

A network administrator configures Dynamic ARP Inspection on a switch After Dynamic ARP Inspection is applied all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces and there is no err-disabled interface. What is causing this problem?A ....

May 23, 2021 1 Comment READ MORE +

Which command should be configured on the switch interface in order to provide the user with network connectivity?

Refer to the exhibit. An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained. Which command should be configured on the switch interface in order to provide the user with network connectivity?A...

May 22, 2021 No Comments READ MORE +

Refer to the exhibit.

Refer to the exhibit. What will happen when the Python script is executedA . The hostname will be printed for the client in the client ID field.B . The script will pull all computer hostnames and print them.C . The hostname will be translated to an IP address and printed.D...

May 22, 2021 No Comments READ MORE +

Which mechanism should the engineer configure to accomplish this goal?

An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?A . mirror portB . NetFlowC . FlowD . VPC...

May 22, 2021 No Comments READ MORE +

Which command was used to display this output?

Refer to the exhibit. Which command was used to display this output?A . show dotlx all summaryB . show dotlx interface gil/O/12C . show dotlx allD . show dotl1xView AnswerAnswer: C

May 22, 2021 No Comments READ MORE +

What must be done on the Cisco ESA to accomplish this goal?

An engineer has enabled LDAP accept queries on a listener. Malicious actors must be preventec from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?A . Use Bounce VerificationB . Configure incoming content filters.C . Configure Directory Harvest Attack PreventionD . Bypass...

May 21, 2021 No Comments READ MORE +

What are two reasons for implementing a multifactor authentication solution such as Cisco Duo Security provide to an organization? (Choose two)

What are two reasons for implementing a multifactor authentication solution such as Cisco Duo Security provide to an organization? (Choose two)A . flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notificationsB . single sign-on access to on-premises and cloud applicationsC . integration with 802....

May 21, 2021 No Comments READ MORE +

What provides visibility and awareness into what is currently occurring on the network?

What provides visibility and awareness into what is currently occurring on the network?A . CMXB . WMIC . Prime InfrastructureD . TelemetryView AnswerAnswer: D

May 21, 2021 No Comments READ MORE +