How is DNS tunneling used to exfiltrate data out of a corporate network?
How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and password B. encryption method C. device serial number D. registration keyView AnswerAnswer: D
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . Public Cloud B. Hybrid Cloud C. Community Cloud D. Private CloudView AnswerAnswer: D
Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?
Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?A . configure system add <host><key> B. configure manager <key> add host C. configure manager delete D. configure manager add <host><keyView AnswerAnswer: D
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?A . RADIUS Change of Authorization B. device tracking C. DHCP snooping D. VLAN hoppingView AnswerAnswer: A
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...
Which statement about the authentication protocol used in the configuration is true?
Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a password B. The authentication request contains only a username C. The authentication and authorization requests are grouped in a single packet D. There are separate authentication and...
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File Analysis B. SafeSearch C. SSL Decryption D. Destination ListsView AnswerAnswer: C Explanation: Reference: https://support.umbrella.com/hc/en-us/articles/115004564126-SSL-Decryption-in-the-IntelligentProxy
Which product meets all of these requirements?
An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?A . Cisco Prime Infrastructure B. Cisco Identity Services...
Which task can you perform to determine where each message was lost?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking. B. Generate a system report. C. Review the log files. D....