Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?A . EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.B . EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.C . EPP focuses on...
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXB . authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXC . secures all the certificates in the IKE...
How many interfaces per bridge group does an ASA bridge group deployment support?
How many interfaces per bridge group does an ASA bridge group deployment support?A . up to 2B . up to 4C . up to 8D . up to 16View AnswerAnswer: B Explanation: Each of the ASAs interfaces need to be grouped into one or more bridge groups. Each of these...
Which technology reduces data loss by identifying sensitive information stored in public computing environments?
Which technology reduces data loss by identifying sensitive information stored in public computing environments?A . Cisco SDAB . Cisco FirepowerC . Cisco HyperFlexD . Cisco CloudlockView AnswerAnswer: D
Which port configuration is missing?
Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate . Which port configuration is missing?A . authentication openB . dotlx reauthenticationC . cisp enableD . dot1x pae authenticatorView AnswerAnswer: D
Which ASA deployment mode can provide separation of management on a shared appliance?
Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone modeB . transparent firewall modeC . multiple context modeD . routed modeView AnswerAnswer: C
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?A . interpacket variationB . software package variationC . flow insight variationD . process details variationView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/global/en_uk/products/switches/cisco_nexus_9300_ex_platform_switches_white_paper_uki.pdf
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile.B . It defines a traffic baseline for traffic anomaly deduction.C . It inspects hosts that meet the profile with more intrusion rules.D . It blocks...
Which two mechanisms are used to control phishing attacks? (Choose two)
Which two mechanisms are used to control phishing attacks? (Choose two)A . Enable browser alerts for fraudulent websites.B . Define security group memberships.C . Revoke expired CRL of the websites.D . Use antispyware software.E . Implement email filtering techniques.View AnswerAnswer: A,E