Which technology is used to improve web traffic performance by proxy caching?

Which technology is used to improve web traffic performance by proxy caching?A . WSA B. Firepower C. FireSIGHT D. ASAView AnswerAnswer: A

August 20, 2023 No Comments READ MORE +

What is a characteristic of traffic storm control behavior?

What is a characteristic of traffic storm control behavior?A . Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval. B. Traffic storm control cannot determine if the packet is unicast or broadcast. C. Traffic storm control monitors incoming traffic levels...

August 20, 2023 No Comments READ MORE +

How is Cisco Umbrella configured to log only security events?

How is Cisco Umbrella configured to log only security events?A . per policy B. in the Reporting settings C. in the Security Settings section D. per network in the Deployments sectionView AnswerAnswer: A Explanation: Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management

August 20, 2023 No Comments READ MORE +

Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?

Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?A . Cisco Security Intelligence B. Cisco Application Visibility and Control C. Cisco Model Driven Telemetry D. Cisco DNA...

August 20, 2023 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . url B. terminal C. profile D. selfsignedView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/211333-IOSPKI-Deployment-Guide-Initial-Design.html

August 20, 2023 No Comments READ MORE +

Which two mechanisms are used to control phishing attacks? (Choose two)

Which two mechanisms are used to control phishing attacks? (Choose two)A . Enable browser alerts for fraudulent websites. B. Define security group memberships. C. Revoke expired CRL of the websites. D. Use antispyware software. E. Implement email filtering techniques.View AnswerAnswer: A,E

August 19, 2023 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIX B. XMPP C. pxGrid D. SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport

August 19, 2023 No Comments READ MORE +

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwords B. Data loss prevention C. Heuristic-based filtering D. Geolocation-based filtering E. NetFlowView AnswerAnswer: B,D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html

August 19, 2023 No Comments READ MORE +

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events. B. It provides stateless IP flow tracking that exports all records of a specific flow. C. It tracks the flow continuously and provides updates every 10 seconds. D. Its events...

August 19, 2023 No Comments READ MORE +

What action is needed to authenticate the VPN?

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on host A. B. Enter the...

August 19, 2023 No Comments READ MORE +