Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?A . Platform Exchange GridB . Advanced Malware ProtectionC . Multifactor Platform IntegrationD . Firepower Threat DefenseView AnswerAnswer: A Explanation:

April 12, 2021 No Comments READ MORE +

Why would a user choose an on-premises ESA versus the CES solution?

Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsiteB . Demand is unpredictableC . The server team wants to outsource this service.D . ESA is deployed inlineView AnswerAnswer: A

April 12, 2021 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)A . Check integer, float, or Boolean string parameters to ensure accurate valuesB . Use prepared statements and parameterized queries.C . Secure the connection between the web and the app tierD . Write SQL code instead of using...

April 12, 2021 No Comments READ MORE +

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)A . Create an ACL to allow UDP traffic on port 9996.B . Enable NetFlow Version 9.C . Create a class map to match interesting traffic.D . Apply NetFlow Exporter to the outside interface in the inbound...

April 12, 2021 1 Comment READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C

April 11, 2021 No Comments READ MORE +

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)A . PutB . OptionC . GetD . PushE . ConnectView AnswerAnswer: A C

April 11, 2021 No Comments READ MORE +

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C

April 11, 2021 No Comments READ MORE +

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . ASDMB . desktop clientC . APID . NetFlowView AnswerAnswer: C

April 11, 2021 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...

April 11, 2021 No Comments READ MORE +

What is a characteristic of Firepower NGIPS inline deployment mode?

What is a characteristic of Firepower NGIPS inline deployment mode?A . It cannot take actions such as blocking traffic.B . ASA with Firepower module cannot be deployed.C . it must have inline interface pairs configured.D . It is out-of-band from traffic.View AnswerAnswer: C

April 11, 2021 No Comments READ MORE +