Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: BD
Which two mechanisms are used to control phishing attacks? (Choose two.)
Which two mechanisms are used to control phishing attacks? (Choose two.)A . Enable browser alerts for fraudulent websites.B . Define security group memberships.C . Revoke expired CRL of the websites.D . Use antispyware software.E . Implement email filtering techniques.View AnswerAnswer: AE
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)A . phishingB . brute forceC . man-in-the-middleD . DDOSE . tear dropView AnswerAnswer: BC
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: DE Explanation: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf
What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirected.B . Traffic from the inside network is redirected.C . All TCP traffic is redirected.D . Traffic from the inside and DMZ networks is redirected.View AnswerAnswer: B
Which ASA deployment mode can provide separation of management on a shared appliance?
Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone modeB . transparent firewall modeC . multiple context modeD . routed modeView AnswerAnswer: C
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)A . SIPB . inline normalizationC . SSLD . packet decoderE . modbusView AnswerAnswer: AC Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Application_Layer_Preprocessors.html
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Device_Management_Basics.html#ID-2242-0000069d
Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/security/asa/special/unified-communications/guide/unifiedcomm/unified-comm-tlsproxy.html