Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig commandB . Configure the advancedproxyconfig command with the HTTPS subcommandC . Configure a small log-entry size.D . Configure a maximum packet size.View AnswerAnswer: B
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: A,C
What is a commonality between DMVPN and FlexVPN technologies?
What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . aaa server radius dynamic-authorB . aaa new-modelC . auth-type allD . ip device-trackingView AnswerAnswer: D
What is the admin5 user able to do on HQ_Router after this configuration?
Refer to the exhibit. A network administrator configures command authorization for the admin5 user . What is the admin5 user able to do on HQ_Router after this configuration?A . set the IP address of an interfaceB . complete no configurationsC . complete all configurationsD . add subinterfacesView AnswerAnswer: B Explanation:...
Which command was used to display this output?
Refer to the exhibit. Which command was used to display this output?A . show dot1x allB . show dot1xC . show dot1x all summaryD . show dot1x interface gi1/0/12View AnswerAnswer: A
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNS CryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: DNS Tunneling is a method of cyber attack that encodes the data of other programs or protocols in DNS...
Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?A . Cisco StealthwatchB . Cisco UmbrellaC . Cisco FirepowerD . NGIPSView AnswerAnswer: B Explanation: Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations C before a...
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . Safe SearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C Explanation: Reference: https://support.umbrella.com/hc/en-us/articles/115004564126-SSL-Decryption-in-the-IntelligentProxy
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . multiple context modeB . user deployment of Layer 3 networksC . IPv6D . clusteringView AnswerAnswer: B Explanation: The ASAv on AWS supports the following features: + Support for Amazon EC2 C5 instances, the next generation of the...