Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web application B. Linux and Windows operating systems C. database D. web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...

August 28, 2023 No Comments READ MORE +

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application Control B. Security Category Blocking C. Content Category Blocking D. File AnalysisView AnswerAnswer: B

August 28, 2023 No Comments READ MORE +

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?A . Cisco Stealth watch B. Cisco Umbrella C. Cisco Firepower D. NGIPSView AnswerAnswer: B Explanation: Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations C before...

August 28, 2023 No Comments READ MORE +

What is a characteristic of Firepower NGIPS inline deployment mode?

What is a characteristic of Firepower NGIPS inline deployment mode?A . ASA with Firepower module cannot be deployed. B. It cannot take actions such as blocking traffic. C. It is out-of-band from traffic. D. It must have inline interface pairs configured.View AnswerAnswer: D

August 28, 2023 No Comments READ MORE +

Which compliance status is shown when a configured posture policy requirement is not met?

Which compliance status is shown when a configured posture policy requirement is not met?A . compliant B. unknown C. authorized D. noncompliantView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_010111.html

August 28, 2023 No Comments READ MORE +

Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . multiple context mode B. user deployment of Layer 3 networks C. IPv6 D. clusteringView AnswerAnswer: B Explanation: The ASAv on AWS supports the following features: + Support for Amazon EC2 C5 instances, the next generation of the...

August 28, 2023 No Comments READ MORE +

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engine B. white list C. RAT D. outbreak filters E. DLPView AnswerAnswer: A,D

August 27, 2023 No Comments READ MORE +

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco Umbrella B. External Threat Feeds C. Cisco Threat Grid D. Cisco StealthwatchView AnswerAnswer: C Explanation: Reference: https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat-intelligencedirector

August 27, 2023 No Comments READ MORE +

Which ASA deployment mode can provide separation of management on a shared appliance?

Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone mode B. transparent firewall mode C. multiple context mode D. routed modeView AnswerAnswer: C

August 27, 2023 No Comments READ MORE +

Which command achieves this goal?

A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?A . snmp-server host inside 10.255.254.1 version 3 andy B. snmp-server host inside 10.255.254.1 version 3 myv3...

August 27, 2023 No Comments READ MORE +