Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf

June 15, 2022 No Comments READ MORE +

Which statement about the authentication protocol used in the configuration is true?

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packetD . There are separate authentication and...

June 15, 2022 No Comments READ MORE +

Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-xe-3se-3850-cr-book/sec-s1-xe-3se-3850-cr-book_chapter_01.html#wp3404908137 Displaying the Summary of All Auth Manager...

June 15, 2022 No Comments READ MORE +

Which ASA deployment mode meets these needs?

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance . Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C

June 15, 2022 No Comments READ MORE +

In which cloud services model is the tenant responsible for virtual machine OS patching?

In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A Explanation: Only in On-site (on-premises) and IaaS we (tenant) manage O/S (Operating System).

June 15, 2022 No Comments READ MORE +

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)A . Windows serviceB . computer identityC . user identityD . Windows firewallE . default browserView AnswerAnswer: A,D

June 14, 2022 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...

June 14, 2022 No Comments READ MORE +

Which option is the main function of Cisco Firepower impact flags?

Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They highlight known and suspected malicious IP addresses in reports.C . They correlate data about intrusions and vulnerability.D . They identify data that the ASA sends to the Firepower module.View...

June 14, 2022 No Comments READ MORE +

What is the primary benefit of deploying an ESA in hybrid mode?

What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environmentB . It provides the lowest total cost of ownership by reducing the need for physical appliancesC . It provides maximum...

June 14, 2022 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . Impact FlagsC . Health MonitoringD . URL FilteringView AnswerAnswer: B

June 14, 2022 No Comments READ MORE +