Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?A . AMPB . AnyConnectC . DynDNSD . TalosView AnswerAnswer: D

January 28, 2021 No Comments READ MORE +

What must be configured, based on a predefined threshold, to address this issue?

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD ....

January 28, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?.

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?.A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

January 27, 2021 No Comments READ MORE +

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?A . Cisco FirepowerB . Cisco UmbrellaC . Cisco Stealth watchD . NGIPSView AnswerAnswer: B

January 27, 2021 No Comments READ MORE +

With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?

With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?A . vulnerable softwareB . file analysisC . detectionsD . prevalenceE . threat root causeView AnswerAnswer: D

January 27, 2021 No Comments READ MORE +

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)A . blocked portsB . simple custom detectionsC . command and controlD . allowed applicationsE . URLView AnswerAnswer: BD Explanation: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter 2

January 27, 2021 No Comments READ MORE +

inline posture node?

Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?A . RADIUS Change of AuthorizationB . device trackingC . DHCP snoopingD . VLAN hoppingView AnswerAnswer: A

January 27, 2021 No Comments READ MORE +

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf

January 27, 2021 No Comments READ MORE +

Where are individual sites specified to be blacklisted in Cisco Umbrella?

Where are individual sites specified to be blacklisted in Cisco Umbrella?A . application settingsB . content categoriesC . security settingsD . destination listsView AnswerAnswer: D

January 27, 2021 No Comments READ MORE +

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D

January 27, 2021 No Comments READ MORE +