Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C
How is ICMP used an exfiltration technique?
How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A
What is causing this problem?
Refer to the exhibit. A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is...
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?A . NGFWB . AMPC . WSAD . ESAView AnswerAnswer: B
Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?
Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?A . westbound APB . southbound APIC . northbound APID . eastbound APIView AnswerAnswer: B
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
Which two behavioral patterns characterize a ping of death attack? (Choose two.)A . The attack is fragmented into groups of 16 octets before transmission.B . The attack is fragmented into groups of 8 octets before transmissionC . Short synchronized bursts of traffic are used to disrupt TCP connections.D . Malformed...
Drag and drop the capabilities from the left onto the correct technologies on the right
DRAG DROP Drag and drop the capabilities from the left onto the correct technologies on the right. View AnswerAnswer: