Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D
Which compliance status is shown when a configured posture policy requirement is not met?
Which compliance status is shown when a configured posture policy requirement is not met?A . compliantB . unknownC . authorizedD . noncompliantView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_010111.html
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . NetFlowB . desktop clientC . ASDMD . APIView AnswerAnswer: D
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?A . SNMPB . SMTPC . syslogD . model-driven telemetryView AnswerAnswer: D Explanation: Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...
What is the primary benefit of deploying an ESA in hybrid mode?
What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environmentB . It provides the lowest total cost of ownership by reducing the need for physical appliancesC . It provides maximum...
Which two mechanisms are used to control phishing attacks? (Choose two)
Which two mechanisms are used to control phishing attacks? (Choose two)A . Enable browser alerts for fraudulent websites.B . Define security group memberships.C . Revoke expired CRL of the websites.D . Use antispyware software.E . Implement email filtering techniques.View AnswerAnswer: A,E
Which action should be taken to accomplish this goal?
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing . Which action should be taken to accomplish this goal?A . Disable telnet using the no ip telnet command.B . Enable the SSH server using the...
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile.B . It defines a traffic baseline for traffic anomaly deduction.C . It inspects hosts that meet the profile with more intrusion rules.D . It blocks...
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an organization? (Choose two)
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an organization? (Choose two)A . flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notificationsB . single sign-on access to on-premises and cloud applicationsC . integration with 802.1x security...