What are two rootkit types? (Choose two)
What are two rootkit types? (Choose two)A . registry B. virtual C. bootloader D. user mode E. buffer modeView AnswerAnswer: C,D Explanation: The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with the highest possible level of access privileges, similar...
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?A . Spero analysis B. dynamic analysis C. sandbox analysis D. malware analysisView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Reference_a_wrapper_Chapter_topic_here.html-> Spero analysis only uploads the signature of the (executable) files to the AMP cloud. It...
What is the problem according to this command output?
Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...
What is a feature of the open platform capabilities of Cisco DNA Center?
What is a feature of the open platform capabilities of Cisco DNA Center?A . intent-based APIs B. automation adapters C. domain integration D. application adaptersView AnswerAnswer: A
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accounting B. assurance C. automation D. authentication E. encryptionView AnswerAnswer: B,C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-center/nb-06-cisco-dna-center-aag-cte-en.html
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile. B. It defines a traffic baseline for traffic anomaly deduction. C. It inspects hosts that meet the profile with more intrusion rules. D. It blocks...
How is DNS tunneling used to exfiltrate data out of a corporate network?
How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . Exchange B. Pull messaging C. Binding D. Correlation E. MitigatingView AnswerAnswer: A,B Explanation: The Trusted Automated exchange of Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to...
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?A . interpacket variation B. software package variation C. flow insight variation D. process details variationView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/global/en_uk/products/switches/cisco_nexus_9300_ex_platform_switches_white_paper_uki.pdf
Which action should be taken to accomplish this goal?
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing. Which action should be taken to accomplish this goal?A . Disable telnet using the no ip telnet command. B. Enable the SSH server using the ip...