Which two preventive measures are used to control cross-site scripting? (Choose two)

Which two preventive measures are used to control cross-site scripting? (Choose two)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...

August 17, 2022 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D

August 17, 2022 No Comments READ MORE +

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)A . It can handle explicit HTTP requests.B . It requires a PAC file for the client web browser.C . It requires a proxy for the client web browser.D . WCCP v2-enabled devices can automatically redirect...

August 17, 2022 No Comments READ MORE +

System?

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)A . packet decoderB . SIPC . modbusD . inline normalizationE . SSLView AnswerAnswer: B, E Explanation: Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application...

August 16, 2022 No Comments READ MORE +

command must be used?

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used? A. flow-export destination inside 1.1.1.1 2055 B. ip flow monitor input C. ip flow-export destination 1.1.1.1 2055 D. flow exporterView AnswerAnswer: A Explanation: The syntax of this command is: flow-export...

August 16, 2022 No Comments READ MORE +

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...

August 16, 2022 No Comments READ MORE +

engineering attacks?

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect against input validation and character escapes in the endpoint.D . Install a spam and virus...

August 16, 2022 No Comments READ MORE +

What is a characteristic of Firepower NGIPS inline deployment mode?

What is a characteristic of Firepower NGIPS inline deployment mode?A . ASA with Firepower module cannot be deployed.B . It cannot take actions such as blocking traffic.C . It is out-of-band from traffic.D . It must have inline interface pairs configured.View AnswerAnswer: D

August 15, 2022 No Comments READ MORE +

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?A . It decrypts HTTPS application traffic for unauthenticated users.B . It alerts users when the WSA decrypts their traffic.C . It decrypts HTTPS application traffic for authenticated users.D . It provides enhanced HTTPS application...

August 15, 2022 No Comments READ MORE +

System?

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . CorrelationB . IntrusionC . Access ControlD . Network DiscoveryView AnswerAnswer: D Explanation: The Firepower System uses network discovery and identity policies to collect host, application, and user data for traffic on your...

August 15, 2022 No Comments READ MORE +