What is the result of this Python script of the Cisco DNA Center API?
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds authentication to a switchB . adds a switch to Cisco DNA CenterC . receives information about a switchView AnswerAnswer: B
Which ASA deployment mode meets these needs?
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance . Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?A . It allows the endpoint to authenticate with 802.1x or MAC . It verifies that the endpoint has the latest Microsoft security patches installed.D . It adds endpoints to identity groups...
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)A . Outgoing traffic is allowed so users can communicate with outside organizations.B . Malware infects the messenger application on the user endpoint to send company data.C . Traffic is encrypted, which prevents visibility on...
Which port configuration is missing?
Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate . Which port configuration is missing?A . authentication openB . dotlx reauthenticationC . cisp enableD . dot1x pae authenticatorView AnswerAnswer: D
How is Cisco Umbrella configured to log only security events?
How is Cisco Umbrella configured to log only security events?A . per policyB . in the Reporting settingsC . in the Security Settings sectionD . per network in the Deployments sectionView AnswerAnswer: A Explanation: Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management
Which two key and block sizes are valid for AES? (Choose two)
Which two key and block sizes are valid for AES? (Choose two)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C,D Explanation:...
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accountingB . assuranceC . automationD . authenticationE . encryptionView AnswerAnswer: B,C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-center/nb-06-cisco-dna-center-aag-cte-en.html
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . ExchangeB . Pull messagingC . BindingD . CorrelationE . MitigatingView AnswerAnswer: B,C Explanation: The Trusted Automated exchange of Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to...
Why would a user choose an on-premises ESA versus the CES solution?
Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsite.B . Demand is unpredictable.C . The server team wants to outsource this service.D . ESA is deployed inline.View AnswerAnswer: A