Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . EavesdroppingB . ARP spoofingC . denial-of-service attacksD . malwareE . exploitsView AnswerAnswer: DE

May 20, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco Anyconnect VPN?

Which protocol provides the strongest throughput performance when using Cisco Anyconnect VPN?A . TLSv1,1B . TLSv1. 2C . TLSv1D . DTLSv1View AnswerAnswer: D

May 20, 2021 No Comments READ MORE +

What is an attribute of the DevSecOps process?

What is an attribute of the DevSecOps process?A . security scanning and theoretical vulnerabilitiesB . isolated security teamC . mandated security controls and check listsD . development securityView AnswerAnswer: D

May 19, 2021 No Comments READ MORE +

Which factor must be considered when choosing the on-premise solution over the cloud-based one?

Which factor must be considered when choosing the on-premise solution over the cloud-based one?A . With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the productB . With an on-premise solution, the customer is responsible for the installation and...

May 19, 2021 No Comments READ MORE +

what is a key difference between Cisco Firepower and Cisco ASA?

what is a key difference between Cisco Firepower and Cisco ASA?A . Cisco Firepower provides identity based access control while Cisco ASA does not.B . Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does notC . Cisco ASA provides SSL inspection while Cisco Firepower does not.D . Cisco...

May 19, 2021 No Comments READ MORE +

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?A . Cisco CloudlockB . Cisco App DynamicsC . Cisco UmbrellaD . Cisco AMPView AnswerAnswer: A

May 19, 2021 No Comments READ MORE +

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?A . Enable IP Layer enforcementB . Enable Intelligent ProxyC . Activate the Advanced Malware Protection licenseD . Activate SSL decryption.View AnswerAnswer: B

May 18, 2021 No Comments READ MORE +

which two ways does a system administrator send web traffic transparently to the Cisco WSA? (Choose two)

which two ways does a system administrator send web traffic transparently to the Cisco WSA? (Choose two)A . configure policy-based routing on the network infrastructureB . configure the proxy IP address in the web-browser settingsC . configure AD Group Policies to push proxy settingsD . use Web Cache Communication ProtocolE...

May 18, 2021 1 Comment READ MORE +

Which two actions should be selected to allow the traffic to pass without inspection?

A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)A . permitB . trustC . resetD . allowE . monitorView AnswerAnswer: B...

April 12, 2021 1 Comment READ MORE +

Which mechanism should the engineer configure to accomplish this goal?

An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?A . mirror portB . NetFlowC . FlowD . VPC...

April 12, 2021 No Comments READ MORE +