Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html

September 25, 2020 No Comments READ MORE +

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application ControlB . Security Category BlockingC . Content Category BlockingD . File AnalysisView AnswerAnswer: B Explanation: Reference: https://support.umbrella.com/hc/en-us/articles/115004563666-Understanding-Security-Categories

September 25, 2020 No Comments READ MORE +

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)A . blocked portsB . simple custom detectionsC . command and controlD . allowed applicationsE . URLView AnswerAnswer: BD Explanation: Reference: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter 2

September 25, 2020 No Comments READ MORE +

What is a characteristic of Dynamic ARP Inspection?

What is a characteristic of Dynamic ARP Inspection?A . DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.B . In a typical network, make all ports as trusted except for the ports connecting to switches, which are...

September 25, 2020 No Comments READ MORE +

Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: B

September 24, 2020 2 Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01110.html

September 24, 2020 No Comments READ MORE +

What does the number 15 represent in this configuration?

Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible failed attempts...

September 23, 2020 No Comments READ MORE +

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?A . NexusB . StealthwatchC . FirepowerD . TetrationView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products

September 23, 2020 No Comments READ MORE +

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . group policyB . access control policyC . device management policyD . platform service policyView AnswerAnswer: D Explanation: Reference:...

September 22, 2020 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: C Explanation: Reference: https://tools.cisco.com/security/center/resources/sql_injection

September 22, 2020 1 Comment READ MORE +