Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Which technology reduces data loss by identifying sensitive information stored in public computing environments?A . Cisco SDAB . Cisco FirepowerC . Cisco HyperFlexD . Cisco CloudlockView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock­cloud-data-security-datasheet.pdf

September 17, 2020 No Comments READ MORE +

How does Cisco Umbrella archive logs to an enterprise-owned storage?

How does Cisco Umbrella archive logs to an enterprise-owned storage?A . by using the Application Programming Interface to fetch the logsB . by sending logs via syslog to an on-premises or cloud-based syslog serverC . by the system administrator downloading the logs from the Cisco Umbrella web portalD . by...

September 16, 2020 No Comments READ MORE +

Which benefit does endpoint security provide the overall security posture of an organization?

Which benefit does endpoint security provide the overall security posture of an organization?A . It streamlines the incident response process to automatically perform digital forensics on the endpoint.B . It allows the organization to mitigate web-based attacks as long as the user is active in the domain.C . It allows...

September 16, 2020 1 Comment READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C

September 15, 2020 No Comments READ MORE +

Which action tests the routing?

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?A . Ensure that the client computers are pointing to the on-premises DNS servers.B . Enable the Intelligent Proxy to validate that traffic...

September 15, 2020 1 Comment READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A

September 15, 2020 No Comments READ MORE +

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling

September 15, 2020 No Comments READ MORE +

Which technology is used to improve web traffic performance by proxy caching?

Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A

September 15, 2020 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0100011.pdf

September 14, 2020 No Comments READ MORE +

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a­glance-c45-736555.pdf

September 14, 2020 No Comments READ MORE +