Which technology must be used to implement secure VPN connectivity among company branches over aprivate IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over aprivate IP cloud with any-to-any scalable connectivity? A. DMVPN B. FlexVPN C. IPsec DVTI D. GET VPNView AnswerAnswer: D Explanation: Cisco‘s Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminate point-to-point...

August 24, 2022 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...

August 24, 2022 No Comments READ MORE +

Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B

August 24, 2022 No Comments READ MORE +

What is the primary benefit of deploying an ESA in hybrid mode?

What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environmentB . It provides the lowest total cost of ownership by reducing the need for physical appliancesC . It provides maximum...

August 24, 2022 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

August 24, 2022 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D

August 24, 2022 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D Explanation: DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based.Therefore DTLS offers strongest throughput performance. The throughput of...

August 24, 2022 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Check integer, float, or Boolean string parameters to ensure accurate values.B . Use prepared statements and parameterized queries.C . Secure the connection between the web and the app tier.D . Write SQL code instead of using...

August 23, 2022 No Comments READ MORE +

System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . Impact FlagsC . Health MonitoringD . URL FilteringView AnswerAnswer: B

August 23, 2022 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two)

Which two capabilities does TAXII support? (Choose two)A . ExchangeB . Pull messagingC . BindingD . CorrelationE . MitigatingView AnswerAnswer: B, C Explanation: The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network.TAXII exists to provide specific capabilities to those...

August 23, 2022 No Comments READ MORE +