What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)

What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)A . Southbound APIs are used to define how SDN controllers integrate with applications.B . Southbound interfaces utilize device configurations such as VLANs and IP addresses.C . Northbound APIs utilize RESTful API methods such as GET,...

April 7, 2022 No Comments READ MORE +

How does DNS Tunneling exfiltrate data?

How does DNS Tunneling exfiltrate data?A . An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.B . An attacker opens a reverse DNS shell to get into the client’s system and install malware on it.C . An attacker uses...

April 6, 2022 No Comments READ MORE +

Which Cisco security solution determines if an endpoint has the latest OS updates and patches installed on the system?

Which Cisco security solution determines if an endpoint has the latest OS updates and patches installed on the system?A . Cisco Endpoint Security AnalyticsB . Cisco AMP for EndpointsC . Endpoint Compliance ScannerD . Security Posture Assessment ServiceView AnswerAnswer: D

April 6, 2022 No Comments READ MORE +

Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access?

Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access?A . Cisco Content PlatformB . Cisco Container ControllerC . Cisco Container PlatformD . Cisco Cloud PlatformView AnswerAnswer: C

April 6, 2022 No Comments READ MORE +

Drag and drop the descriptions from the left onto the encryption algorithms on the right

DRAG DROP Drag and drop the descriptions from the left onto the encryption algorithms on the right. View AnswerAnswer: Explanation: Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetric encryption uses a pair of public key and...

April 6, 2022 No Comments READ MORE +

What is a requirement for both physical hosts?

A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?A . The hosts must run Cisco AsyncOS 10.0 or greater.B . The hosts must run different versions of Cisco AsyncOD...

April 5, 2022 1 Comment READ MORE +

Why should organizations migrate to an MFA strategy for authentication?

Why should organizations migrate to an MFA strategy for authentication? A. Single methods of authentication can be compromised more easily than MFA. B. Biometrics authentication leads to the need for MFA due to its ability to be hacked easily. C. MFA methods of authentication are never compromised. D. MFA does...

April 5, 2022 No Comments READ MORE +

What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)

What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)A . If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.B . PAC files use if-else statements to determine whether to use a proxy or a...

April 5, 2022 No Comments READ MORE +

Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?A . IntegrationB . IntentC . EventD . MultivendorView AnswerAnswer: B

April 5, 2022 No Comments READ MORE +

Drag and drop the cloud security assessment components from the left onto the definitions on the right

DRAG DROP Drag and drop the cloud security assessment components from the left onto the definitions on the right. View AnswerAnswer:

April 5, 2022 No Comments READ MORE +