Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application ControlB . Security Category BlockingC . Content Category BlockingD . File AnalysisView AnswerAnswer: B Explanation: Reference: https://support.umbrella.com/hc/en-us/articles/115004563666-Understanding-Security-Categories
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)A . blocked portsB . simple custom detectionsC . command and controlD . allowed applicationsE . URLView AnswerAnswer: BD Explanation: Reference: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter 2
What is a characteristic of Dynamic ARP Inspection?
What is a characteristic of Dynamic ARP Inspection?A . DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.B . In a typical network, make all ports as trusted except for the ports connecting to switches, which are...
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: B
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01110.html
What does the number 15 represent in this configuration?
Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible failed attempts...
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?A . NexusB . StealthwatchC . FirepowerD . TetrationView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . group policyB . access control policyC . device management policyD . platform service policyView AnswerAnswer: D Explanation: Reference:...
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: C Explanation: Reference: https://tools.cisco.com/security/center/resources/sql_injection