What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . Its events match all traffic classes in parallel.B . It tracks the flow continuously and provides updates every 10 seconds.C . It tracks flow-create, flow-teardown, and flow-denied events.D . It provides stateless IP flow tracking that exports...
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitwrongB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D
Which functions of an SDN architecture require southbound APIs to enable communication?
Which functions of an SDN architecture require southbound APIs to enable communication?A . management console and the cloudB . management console and the SDN controllerC . SDN controller and the cloudD . SDN controller and the network elementsView AnswerAnswer: D
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . profileB . urlC . terminalD . selfsignedView AnswerAnswer: A
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accountingB . encryptionC . assuranceD . automationE . authenticationView AnswerAnswer: CD
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC
Which API is used for Content Security?
Which API is used for Content Security?A . OpenVuln APIB . IOS XR APIC . NX-OS APID . AsyncOS APIView AnswerAnswer: D
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...
Which attack is commonly associated with C and C++ programming languages?
Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingwrongB . DDoSC . buffer overflowD . water holingView AnswerAnswer: C
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?A . It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.B . It discovers and controls cloud apps that are connected to a company’s corporate environment.C . It...