Which Cisco ASA command must be used?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA . Which Cisco ASA command must be used? A. flow-export destination inside 1.1.1.1 2055 B. ip flow monitor input C. ip flow-export destination 1.1.1.1 2055 D. flow exporterView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_nsel.html
Which outbreak control method is used to accomplish this task?
An engineer is configuring AMP for endpoints and wants to block certain files from executing . Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . RSAC . DESD . AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation, as...
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?A . Advanced Malware ProtectionB . Platform Exchange GridC . Multifactor Platform IntegrationD . Firepower Threat DefenseView AnswerAnswer: B Explanation: With Cisco...
Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/security-book/security-overview.html
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Security ExploitsB . Common Vulnerabilities and ExposuresC . Common Exploits and VulnerabilitiesD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: B Explanation: Reference: CCNP And CCIE Security Core SCOR...
Which probe must be enabled for this type of profiling to work?
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group . Which probe must be enabled for this type of profiling to work?A . NetFlowB . NMAPC . SNMPD . DHCPView AnswerAnswer: B Explanation: Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling
What is a commonality between DMVPN and FlexVPN technologies?
What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...
Where are individual sites specified to be blacklisted in Cisco Umbrella?
Where are individual sites specified to be blacklisted in Cisco Umbrella?A . application settingsB . content categoriesC . security settingsD . destination listsView AnswerAnswer: D Explanation: Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists