Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: DE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)A . SIPB . inline normalizationC . SSLD . packet decoderE . modbusView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Application_Layer_Preprocessors.html
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the management solutionView AnswerAnswer: D
What does the number 15 represent in this configuration?
Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible failed attempts...
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: B
In which cloud services model is the tenant responsible for virtual machine OS patching?
In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A Explanation: Reference: https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paashow-microsoft-office-365-azure-fit-in-021672.php
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0100011.pdf
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: C Explanation: Reference: https://tools.cisco.com/security/center/resources/sql_injection
Which two preventive measures are used to control cross-site scripting? (Choose two.)
Which two preventive measures are used to control cross-site scripting? (Choose two.)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . SameSite cookie attribute should not...
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?A . It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.B . It discovers and controls cloud apps that are connected to a company’s corporate environment.C . It...