What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

January 30, 2021 No Comments READ MORE +

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D Explanation: https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/

January 29, 2021 No Comments READ MORE +

How does Cisco Stealthwatch Cloud provide security for cloud environments?

How does Cisco Stealthwatch Cloud provide security for cloud environments? A. It delivers visibility and threat detection. B. It prevents exfiltration of sensitive datA. C. It assigns Internet-based DNS protection for clients and servers. D. It facilitates secure connectivity between public and private networks.View AnswerAnswer: A Explanation: https://www.content.shi.com/SHIcom/ContentAttachmentImages/SharedResources/FBLP/Cis co/Cisco-091919-Simple-IT-Whitepaper.pdf

January 29, 2021 No Comments READ MORE +

What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...

January 29, 2021 No Comments READ MORE +

Which two solutions mitigate the risk of this ransomware infection?

An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)A . Configure a posture policy in Cisco Identity Services Engine...

January 29, 2021 No Comments READ MORE +

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?A . Enable IP Layer enforcement.B . Activate the Advanced Malware Protection licenseC . Activate SSL decryption.D . Enable Intelligent Proxy.View AnswerAnswer: D

January 29, 2021 No Comments READ MORE +

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?A . EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.B . EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.C . EPP focuses on...

January 29, 2021 No Comments READ MORE +

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events.B . It provides stateless IP flow tracking that exports all records of a specific flow.C . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...

January 28, 2021 No Comments READ MORE +

Which outbreak control method is used to accomplish this task?

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C

January 28, 2021 No Comments READ MORE +

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the management solutionView AnswerAnswer: D

January 28, 2021 No Comments READ MORE +