Which outbreak control method is used to accomplish this task?

An engineer is configuring AMP for endpoints and wants to block certain files from executing . Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C

March 17, 2021 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A

March 16, 2021 No Comments READ MORE +

What is managed by Cisco Security Manager?

What is managed by Cisco Security Manager?A . WSAB . ASAC . access point OD . ESAView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/products/collateral/security/security-manager/datasheet-C78-737182.html

March 16, 2021 No Comments READ MORE +

What must be configured, based on a predefined threshold, to address this issue?

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network . What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD...

March 15, 2021 No Comments READ MORE +

Drag and drop the descriptions from the left onto the correct protocol versions on the right.

Drag and drop the descriptions from the left onto the correct protocol versions on the right. View AnswerAnswer:

March 15, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . BJTLSvlC . TLSv1.1D . DTLSv1View AnswerAnswer: D

March 15, 2021 No Comments READ MORE +

What is the purpose of the certificate signing request when adding a new certificate for a server?

What is the purpose of the certificate signing request when adding a new certificate for a server?A . It is the password for the certificate that is needed to install it with.B . It provides the server information so a certificate can be created and signedC . It is the...

March 15, 2021 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two.)

Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: A B

March 15, 2021 No Comments READ MORE +

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Which technology reduces data loss by identifying sensitive information stored in public computing environments?A . Cisco SDAB . Cisco FirepowerC . Cisco HyperFlexD . Cisco CloudlockView AnswerAnswer: D

March 15, 2021 No Comments READ MORE +

Which SNMPv3 configuration must be used to support the strongest security possible?

Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andyB . asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...

March 14, 2021 No Comments READ MORE +