Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C

January 16, 2021 No Comments READ MORE +

How is ICMP used an exfiltration technique?

How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...

January 16, 2021 No Comments READ MORE +

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A

January 16, 2021 No Comments READ MORE +

What is causing this problem?

Refer to the exhibit. A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is...

January 16, 2021 1 Comment READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D

January 15, 2021 No Comments READ MORE +

Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?

Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?A . NGFWB . AMPC . WSAD . ESAView AnswerAnswer: B

January 15, 2021 No Comments READ MORE +

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?A . westbound APB . southbound APIC . northbound APID . eastbound APIView AnswerAnswer: B

January 15, 2021 No Comments READ MORE +

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A

January 15, 2021 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

Which two behavioral patterns characterize a ping of death attack? (Choose two.)A . The attack is fragmented into groups of 16 octets before transmission.B . The attack is fragmented into groups of 8 octets before transmissionC . Short synchronized bursts of traffic are used to disrupt TCP connections.D . Malformed...

January 15, 2021 No Comments READ MORE +

Drag and drop the capabilities from the left onto the correct technologies on the right

DRAG DROP Drag and drop the capabilities from the left onto the correct technologies on the right. View AnswerAnswer:

January 15, 2021 No Comments READ MORE +