Which two activities can be done using Cisco DNA Center? (Choose two.)
Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: B,E
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)A . phishingB . brute forceC . man-in-the-middleD . DDOSE . tear dropView AnswerAnswer: B,C
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabledB . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...
What is causing this issue?
Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?A . Site-to-site VPN peers are using different encryption algorithms.B . Site-to-site VPN preshared keys are mismatched.C . No split-tunnel policy is defined on the Firepower Threat Defense...
Which two capabilities does TAXII support? (Choose two.)
Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: A,B
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)A . authentication server: Cisco Identity Service EngineB . supplicant: Cisco AnyConnect ISE Posture moduleC . authenticator: Cisco Catalyst switchD . authenticator: Cisco Identity Services EngineE . authentication server: Cisco Prime InfrastructureView AnswerAnswer: A,C
Which two mechanisms are used to control phishing attacks? (Choose two.)
Which two mechanisms are used to control phishing attacks? (Choose two.)A . Enable browser alerts for fraudulent websitesB . Define security group membershipsC . Revoke expired CRL of the websitesD . Use antispyware softwareE . Implement email filtering techniquesView AnswerAnswer: A,E
What must be configured in order to prevent the session during the initial TCP communication?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?A . Configure the Cisco ESA to drop the malicious emails.B . Configure policies to quarantine malicious emails.C . Configure policies to stop and reject...
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: A,C