Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)A . PutB . OptionC . GetD . PushE . ConnectView AnswerAnswer: A C
Which Dos attack uses fragmented packets to crash a target machine?
Which Dos attack uses fragmented packets to crash a target machine?A . teardropB . MITMC . smurfD . LANDView AnswerAnswer: A
How does Cisco Advanced Phishing Protection protect users?
How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It uses machine learning and real-time behavior analytics.E . It utilizes sensors that send messages securely.View AnswerAnswer: C Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-email-security/at-a-glance-c45-740894.pd
An MDM provides which two advantages to an organization with regards to device management? (Choose two.)
An MDM provides which two advantages to an organization with regards to device management? (Choose two.)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: B E
Which attack is commonly associated with C and C++ programming languages?
Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D
Which two activities can be done using Cisco DNA Center? (Choose two.)
Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: B E
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?A . to prevent theft of the endpointsB . because defense-in-depth stops at the networkC . to expose the endpoint to more...
How does Cisco Stealthwatch Cloud provide security for cloud environments?
How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection.B . It prevents exfiltration of sensitive data.C . It assigns Internet-based DNS protection for clients and serversD . It facilitates secure connectivity between public and private networksView AnswerAnswer: A
Which probe must be enabled for this type of profiling to work?
An engineer wants to automatically assign endpoints that have a specific OUl into a new endpoint group. Which probe must be enabled for this type of profiling to work?A . NetFlowB . DHCPC . SNMPD . NMAPView AnswerAnswer: D
Drag and drop the threats from the left onto examples of that threat on the right
Drag and drop the threats from the left onto examples of that threat on the right View AnswerAnswer: