Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist CenterB . File Reputation CenterC . AMP Reputation CenterD . IP and Domain Reputation CenterView AnswerAnswer: D
What is the admin5 user able to do on HQ_Router after this configuration?
Refer to the exhibit. A network administrator configures command authorization for the admin5 user . What is the admin5 user able to do on HQ_Router after this configuration?A . set the IP address of an interfaceB . complete no configurationsC . complete all configurationsD . add subinterfacesView AnswerAnswer: B Explanation:...
Which API is used for Content Security?
Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwordsB . Data loss preventionC . Heuristic-based filteringD . Geolocation-based filteringE . NetFlowView AnswerAnswer: B,D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html
Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor authB . local web authC . single sign-onD . central web authE . TACACS+View AnswerAnswer: B,D
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . SmurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...
Which Cisco AMP file disposition valid?
Which Cisco AMP file disposition valid?A . pristineB . malwareC . dirtyD . non maliciousView AnswerAnswer: B
What does the number 15 represent in this configuration?
CORRECT TEXT Refer to the exhibit. What does the number 15 represent in this configuration?A . privilege level for an authorized user to this routerB . access list that identifies the SNMP devices that can access the routerC . interval in seconds between SNMPv3 authentication attemptsD . number of possible...
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engineB . white listC . RATD . outbreak filtersE . DLPView AnswerAnswer: A,D