What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwordsB . Data loss preventionC . Heuristic-based filteringD . Geolocation-based filteringE . NetFlowView AnswerAnswer: B,D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . putB . optionsC . getD . pushE . connectView AnswerAnswer: A,C Explanation: The ASA REST API gives you programmatic access to managing individual ASAs through a Representational State Transfer (REST) API. The API allows...
What does the Cloud lock Apps Firewall do to mitigate security concerns from an application perspective?
What does the Cloud lock Apps Firewall do to mitigate security concerns from an application perspective?A . It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.B . It discovers and controls cloud apps that are connected to a company’s corporate environment.C ....
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encrypted-transport-vpn/GETVPN_DIG_version_2_0_External.pdf
Which statement about IOS zone-based firewalls is true?
Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?A . RBACB . ETHOS detection engineC . SPERO detection engineD . TETRA detection engineView AnswerAnswer: B
organization?
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an organization? (Choose two)A . flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notificationsB . single sign-on access to on-premises and cloud applicationsC . integration with 802.1x security...
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?A . show authorization statusB . show authen sess int gi0/1C . show connection status gi0/1D . show ver gi0/1View AnswerAnswer: B
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...