What is the function of Cisco Cloudlock for data security?

What is the function of Cisco Cloudlock for data security?A . data loss preventionB . controls malicious cloud appsC . detects anomaliesD . user and entity behavior analyticsView AnswerAnswer: A Explanation: Reference: https://umbrella.cisco.com/products/casb

March 22, 2020 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two.)

Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: BC

March 22, 2020 1 Comment READ MORE +

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?A . NexusB . StealthwatchC . FirepowerD . TetrationView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products

March 22, 2020 No Comments READ MORE +

Which action tests the routing?

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?A . Ensure that the client computers are pointing to the on-premises DNS servers.B . Enable the Intelligent Proxy to validate that traffic...

March 20, 2020 1 Comment READ MORE +

Which benefit does endpoint security provide the overall security posture of an organization?

Which benefit does endpoint security provide the overall security posture of an organization?A . It streamlines the incident response process to automatically perform digital forensics on the endpoint.B . It allows the organization to mitigate web-based attacks as long as the user is active in the domain.C . It allows...

March 20, 2020 No Comments READ MORE +

Which statement about the authentication protocol used in the configuration is true?

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packet.D . There are separate authentication and...

March 20, 2020 No Comments READ MORE +

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application ControlB . Security Category BlockingC . Content Category BlockingD . File AnalysisView AnswerAnswer: B Explanation: Reference: https://support.umbrella.com/hc/en-us/articles/115004563666-Understanding-Security-Categories

March 19, 2020 No Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01110.html

March 19, 2020 No Comments READ MORE +

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B

March 19, 2020 No Comments READ MORE +

How does Cisco Umbrella archive logs to an enterprise-owned storage?

How does Cisco Umbrella archive logs to an enterprise-owned storage?A . by using the Application Programming Interface to fetch the logsB . by sending logs via syslog to an on-premises or cloud-based syslog serverC . by the system administrator downloading the logs from the Cisco Umbrella web portalD . by...

March 19, 2020 No Comments READ MORE +