What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . Its events match all traffic classes in parallel.B . It tracks the flow continuously and provides updates every 10 seconds.C . It tracks flow-create, flow-teardown, and flow-denied events.D . It provides stateless IP flow tracking that exports...

October 27, 2020 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitwrongB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D

October 27, 2020 No Comments READ MORE +

Which functions of an SDN architecture require southbound APIs to enable communication?

Which functions of an SDN architecture require southbound APIs to enable communication?A . management console and the cloudB . management console and the SDN controllerC . SDN controller and the cloudD . SDN controller and the network elementsView AnswerAnswer: D

October 27, 2020 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . profileB . urlC . terminalD . selfsignedView AnswerAnswer: A

October 27, 2020 No Comments READ MORE +

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accountingB . encryptionC . assuranceD . automationE . authenticationView AnswerAnswer: CD

October 27, 2020 No Comments READ MORE +

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC

October 26, 2020 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . OpenVuln APIB . IOS XR APIC . NX-OS APID . AsyncOS APIView AnswerAnswer: D

October 26, 2020 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...

October 26, 2020 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingwrongB . DDoSC . buffer overflowD . water holingView AnswerAnswer: C

October 26, 2020 No Comments READ MORE +

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?A . It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.B . It discovers and controls cloud apps that are connected to a company’s corporate environment.C . It...

September 26, 2020 No Comments READ MORE +