Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web application B. Linux and Windows operating systems C. database D. web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application Control B. Security Category Blocking C. Content Category Blocking D. File AnalysisView AnswerAnswer: B
Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?A . Cisco Stealth watch B. Cisco Umbrella C. Cisco Firepower D. NGIPSView AnswerAnswer: B Explanation: Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations C before...
What is a characteristic of Firepower NGIPS inline deployment mode?
What is a characteristic of Firepower NGIPS inline deployment mode?A . ASA with Firepower module cannot be deployed. B. It cannot take actions such as blocking traffic. C. It is out-of-band from traffic. D. It must have inline interface pairs configured.View AnswerAnswer: D
Which compliance status is shown when a configured posture policy requirement is not met?
Which compliance status is shown when a configured posture policy requirement is not met?A . compliant B. unknown C. authorized D. noncompliantView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_010111.html
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . multiple context mode B. user deployment of Layer 3 networks C. IPv6 D. clusteringView AnswerAnswer: B Explanation: The ASAv on AWS supports the following features: + Support for Amazon EC2 C5 instances, the next generation of the...
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engine B. white list C. RAT D. outbreak filters E. DLPView AnswerAnswer: A,D
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco Umbrella B. External Threat Feeds C. Cisco Threat Grid D. Cisco StealthwatchView AnswerAnswer: C Explanation: Reference: https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat-intelligencedirector
Which ASA deployment mode can provide separation of management on a shared appliance?
Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone mode B. transparent firewall mode C. multiple context mode D. routed modeView AnswerAnswer: C
Which command achieves this goal?
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?A . snmp-server host inside 10.255.254.1 version 3 andy B. snmp-server host inside 10.255.254.1 version 3 myv3...