Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat? (Choose Two)
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat? (Choose Two)A . westbound APB . southbound APIC . northbound APID . eastbound APIView AnswerAnswer: B C
How is ICMP used an exfiltration technique?
How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...
Which probe must be enabled for this type of profiling to work?
An engineer wants to automatically assign endpoints that have a specific OUl into a new endpoint group. Which probe must be enabled for this type of profiling to work?A . NetFlowB . DHCPC . SNMPD . NMAPView AnswerAnswer: D
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)A . eavesdroppingB . denial-of-service attacksC . ARP spoofingD . malwareE . exploitsView AnswerAnswer: A E
Which SNMPv3 configuration must be used to support the strongest security possible?
Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andyB . asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...
Which Dos attack uses fragmented packets to crash a target machine?
Which Dos attack uses fragmented packets to crash a target machine?A . teardropB . MITMC . smurfD . LANDView AnswerAnswer: A
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)A . virtualizationB . middlewareC . operating systemsD . applicationsE . dataView AnswerAnswer: D E Explanation: https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/
Which attack is commonly associated with C and C++ programming languages?
Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D
Which type of authentication is in use?
Refer to the exhibit. Which type of authentication is in use?A . LDAP authentication for Microsoft OutlookB . POP3 authenticationC . SMTP relay server authenticationD . external user and relay mail authenticationView AnswerAnswer: A