Which command enables 802.1X globally on a Cisco switch?

Which command enables 802.1X globally on a Cisco switch?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . aaa new-modelView AnswerAnswer: A

January 20, 2021 No Comments READ MORE +

Which command achieves this goal?

A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?A . snmp-server host inside 10.255.254.1 snmpv3 myv3B . snmp-server host inside 10.255.254.1 snmpv3 andyC . snmp-server...

January 20, 2021 No Comments READ MORE +

Which ASA deployment mode meets these needs?

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . multiple context modeB . transparent modeC . routed modeD . multiple zone modeView AnswerAnswer: A

January 20, 2021 No Comments READ MORE +

How will the Cisco ESA handle any files which need analysis?

A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?A . AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.B...

January 19, 2021 No Comments READ MORE +

Which product should be used to accomplish this goal?

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?A . Cisco FirepowerB . Cisco UmbrellaC...

January 19, 2021 No Comments READ MORE +

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?A . It decrypts HTTPS application traffic for unauthenticated usersB . It alerts users when the WSA decrypts their traffic.C . It decrypts HTTPS application traffic for authenticated users.D . It provides enhanced HTTPS application...

January 19, 2021 No Comments READ MORE +

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?A . Encrypted Traffic AnalyticsB . Threat Intelligence DirectorC . Cognitive Threat AnalyticsD . Cisco Talos IntelligenceView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-troubleshoot-cisco-threat.html

January 19, 2021 No Comments READ MORE +

Which two solutions mitigate the risk of this ransomware infection?

An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)A . Configure a posture policy in Cisco Identity Services Engine...

January 19, 2021 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . BJTLSvlC . TLSv1.1D . DTLSv1View AnswerAnswer: D

January 19, 2021 No Comments READ MORE +

What action would allow the attacker to gain access to machine 1 but not machine 2?

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending continuous...

January 18, 2021 No Comments READ MORE +