Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two.)

Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two.)A . protocol IDsB . URLsC . IP addressesD . port numbersE . MAC addressesView AnswerAnswer: B,C

January 18, 2021 No Comments READ MORE +

Which CoA type achieves this goal?

An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C

January 18, 2021 No Comments READ MORE +

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?A . when there is a need for traditional anti-malware detectionB . when there is no need to have the solution centrally managedC . when there te no firewall on the networkD . when...

January 18, 2021 1 Comment READ MORE +

Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C

January 18, 2021 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . security intelligenceB . impact flagsC . health monitoringD . URL filteringView AnswerAnswer: A

January 18, 2021 No Comments READ MORE +

What is the primary role of the Cisco Email Security Appliance?

What is the primary role of the Cisco Email Security Appliance?A . Mail Submission AgentB . Mail Transfer AgentC . Mail Delivery AgentD . Mail User AgentView AnswerAnswer: B

January 18, 2021 No Comments READ MORE +

Which SNMPv3 configuration must be used to support the strongest security possible?

Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andyB . asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...

January 18, 2021 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C

January 17, 2021 No Comments READ MORE +

What are two DDoS attack categories? (Choose two.)

What are two DDoS attack categories? (Choose two.)A . sequentialB . protocolC . databaseD . volume-basedE . scree-basedView AnswerAnswer: B,D Explanation: https://www.cisco.com/c/en/us/products/security/what-is-a-ddos-attack.html

January 17, 2021 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D

January 16, 2021 No Comments READ MORE +