What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...
Which benefit does endpoint security provide the overall security posture of an organization?
Which benefit does endpoint security provide the overall security posture of an organization?A . It streamlines the incident response process to automatically perform digital forensics on the endpoint.B . It allows the organization to mitigate web-based attacks as long as the user is active in the domain.C . It allows...
What action would allow the attacker to gain access to machine 1 but not machine 2?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows . What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending...
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . SmurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . exploitsB . ARP spoofingC . denial-of-service attacksD . malwareE . eavesdroppingView AnswerAnswer: A,D Explanation: Malware means “malicious software”, is any software intentionally designed to cause damage to a...
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco Stealth watchView AnswerAnswer: C Explanation: Reference: https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat-intelligencedirector
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . NetFlowB . desktop clientC . ASDMD . APIView AnswerAnswer: D
On which part of the IT environment does DevSecOps focus?
On which part of the IT environment does DevSecOps focus?A . application developmentB . wireless networkC . data centerD . perimeter networkView AnswerAnswer: A
applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?A . Cisco Security IntelligenceB . Cisco Application Visibility and ControlC . Cisco Model Driven TelemetryD . Cisco DNA...
What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirectedB . Traffic from the inside network is redirectedC . All TCP traffic is redirectedD . Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configurefirepower-00.html