What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

March 12, 2020 No Comments READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A

March 12, 2020 No Comments READ MORE +

Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)A . phishingB . brute forceC . man-in-the-middleD . DDOSE . tear dropView AnswerAnswer: BC

March 12, 2020 3 Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D

March 12, 2020 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . security intelligenceB . impact flagsC . health monitoringD . URL filteringView AnswerAnswer: A

March 12, 2020 3 Comments READ MORE +

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Which technology reduces data loss by identifying sensitive information stored in public computing environments?A . Cisco SDAB . Cisco FirepowerC . Cisco HyperFlexD . Cisco CloudlockView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock­cloud-data-security-datasheet.pdf

March 11, 2020 No Comments READ MORE +

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling

March 11, 2020 No Comments READ MORE +

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: AD

March 10, 2020 No Comments READ MORE +

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C

March 9, 2020 No Comments READ MORE +