Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)A . PutB . OptionC . GetD . PushE . ConnectView AnswerAnswer: A C

March 20, 2021 No Comments READ MORE +

Which Dos attack uses fragmented packets to crash a target machine?

Which Dos attack uses fragmented packets to crash a target machine?A . teardropB . MITMC . smurfD . LANDView AnswerAnswer: A

March 20, 2021 No Comments READ MORE +

How does Cisco Advanced Phishing Protection protect users?

How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It uses machine learning and real-time behavior analytics.E . It utilizes sensors that send messages securely.View AnswerAnswer: C Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-email-security/at-a-glance-c45-740894.pd

March 20, 2021 No Comments READ MORE +

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: B E

March 20, 2021 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D

March 20, 2021 No Comments READ MORE +

Which two activities can be done using Cisco DNA Center? (Choose two.)

Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: B E

March 19, 2021 No Comments READ MORE +

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?A . to prevent theft of the endpointsB . because defense-in-depth stops at the networkC . to expose the endpoint to more...

March 19, 2021 No Comments READ MORE +

How does Cisco Stealthwatch Cloud provide security for cloud environments?

How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection.B . It prevents exfiltration of sensitive data.C . It assigns Internet-based DNS protection for clients and serversD . It facilitates secure connectivity between public and private networksView AnswerAnswer: A

March 18, 2021 No Comments READ MORE +

Which probe must be enabled for this type of profiling to work?

An engineer wants to automatically assign endpoints that have a specific OUl into a new endpoint group. Which probe must be enabled for this type of profiling to work?A . NetFlowB . DHCPC . SNMPD . NMAPView AnswerAnswer: D

March 18, 2021 No Comments READ MORE +

Drag and drop the threats from the left onto examples of that threat on the right

Drag and drop the threats from the left onto examples of that threat on the right View AnswerAnswer:

March 18, 2021 No Comments READ MORE +