What is managed by Cisco Security Manager?

What is managed by Cisco Security Manager?A . WSAB . ASAC . access point OD . ESAView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/products/collateral/security/security-manager/datasheet-C78-737182.html

April 9, 2021 No Comments READ MORE +

When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN configuration as opposed to DMVPN?

When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN configuration as opposed to DMVPN?A . Multiple routers or VRFs are required.B . Traffic is distributed statically by default.C . Floating static routes are required.D . HSRP is used for fallover.View AnswerAnswer: B

April 9, 2021 No Comments READ MORE +

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A

April 9, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . BJTLSvlC . TLSv1.1D . DTLSv1View AnswerAnswer: D

April 9, 2021 No Comments READ MORE +

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: D E

April 8, 2021 No Comments READ MORE +

What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...

April 8, 2021 No Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D

April 8, 2021 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A

April 8, 2021 No Comments READ MORE +

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?A . EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.B . EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.C . EPP focuses on...

April 7, 2021 No Comments READ MORE +

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application ControlB . Security Category BlockingC . Content Category BlockingD . File AnalysisView AnswerAnswer: B

April 7, 2021 No Comments READ MORE +