What features does Cisco FTDv provide over ASAv?
What features does Cisco FTDv provide over ASAv?A . Cisco FTDv runs on VMWare while ASAv does notB . Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does notC . Cisco FTDv supports URL filtering while ASAv does notD . Cisco FTDv runs on AWS while ASAv does...
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?A . weak...
How does Cisco Stealthwatch Cloud provide security for cloud environments?
How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection.B . It prevents exfiltration of sensitive data.C . It assigns Internet-based DNS protection for clients and serversD . It facilitates secure connectivity between public and private networksView AnswerAnswer: A
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D
Which two capabilities does TAXII support? (Choose two.)
Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: A B
What must be configured to accomplish this?
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically. What must be configured to accomplish this?A . Configure the Cisco WSA to...
Which attack type attempts to shut down a machine or network so that users are not able to access it?
Which attack type attempts to shut down a machine or network so that users are not able to access it?A . IP spoofingB . bluesnarfingC . MAC spoofingD . smurfView AnswerAnswer: D
Which algorithm provides asymmetric encryption?
Which algorithm provides asymmetric encryption?A . RC4B . RSAC . AESD . 3DESView AnswerAnswer: B Explanation: https://securityboulevard.com/2020/05/types-of-encryption-5-encryption-algorithms-how-to-choose-the-right-on
What are two functions of secret key cryptography? (Choose two.)
What are two functions of secret key cryptography? (Choose two.)A . key selection without integer factorizationB . utilization of different keys for encryption and decryptionC . utilization of large prime number iterationsD . utilization of less memoryE . provides the capability to only know the key on one sideView AnswerAnswer:...
Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?A . TCP 6514B . UDP 1700C . TCP 49D . UDP 1812View AnswerAnswer: B...