Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
Which two capabilities does TAXII support? (Choose two.)
Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: BC
What is the function of Cisco Cloudlock for data security?
What is the function of Cisco Cloudlock for data security?A . data loss preventionB . controls malicious cloud appsC . detects anomaliesD . user and entity behavior analyticsView AnswerAnswer: A Explanation: Reference: https://umbrella.cisco.com/products/casb
Which statement about the authentication protocol used in the configuration is true?
Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packet.D . There are separate authentication and...
Which two descriptions of AES encryption are true? (Choose two.)
Which two descriptions of AES encryption are true? (Choose two.)A . AES is less secure than 3DEC . AES is more secure than 3DEE . AES can use a 168-bit key for encryption.F . AES can use a 256-bit key for encryption.G . AES encrypts and decrypts a key three...
In which cloud services model is the tenant responsible for virtual machine OS patching?
In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A Explanation: Reference: https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paashow-microsoft-office-365-azure-fit-in-021672.php
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events.B . It provides stateless IP flow tracking that exports all records of a specific flow.C . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...