Which statement about the authentication protocol used in the configuration is true?
Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packet.D . There are separate authentication and...
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B
Which two key and block sizes are valid for AES? (Choose two.)
Which two key and block sizes are valid for AES? (Choose two.) A. 64-bit block size, 112-bit key length B. 64-bit block size, 168-bit key length C. 128-bit block size, 192-bit key length D. 128-bit block size, 256-bit key length E. 192-bit block size, 256-bit key lengthView AnswerAnswer: CD Explanation:...
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect against input validation and character escapes in the endpoint.D . Install a spam and virus...
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)A . computer identityB . Windows serviceC . user identityD . Windows firewallE . default browserView AnswerAnswer: BD
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco StealthwatchView AnswerAnswer: C
Which SNMPv3 configuration must be used to support the strongest security possible?
Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andyB . asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?A . PaasB . XaasC . IaasD . SaasView AnswerAnswer: A
What is a characteristic of traffic storm control behavior?
What is a characteristic of traffic storm control behavior?A . Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.B . Traffic storm control cannot determine if the packet is unicast or broadcast.C . Traffic storm control monitors incoming traffic levels...