How does Cisco Stealthwatch Cloud provide security for cloud environments?

How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection. B. It prevents exfiltration of sensitive data. C. It assigns Internet-based DNS protection for clients and servers. D. It facilitates secure connectivity between public and private networks.View AnswerAnswer: A Explanation: Cisco Stealthwatch Cloud:...

August 25, 2023 No Comments READ MORE +

Which type of attack is social engineering?

Which type of attack is social engineering?A . trojan B. phishing C. malware D. MITMView AnswerAnswer: B Explanation: Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company...

August 25, 2023 No Comments READ MORE +

How is ICMP used an exfiltration technique?

How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packets B. by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address C. by encrypting the payload in an ICMP packet to carry out command and...

August 25, 2023 No Comments READ MORE +

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . aaa server radius dynamic-author B. aaa new-model C. auth-type all D. ip device-trackingView AnswerAnswer: D

August 24, 2023 No Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor auth B. local web auth C. single sign-on D. central web auth E. TACACS+View AnswerAnswer: B,D

August 24, 2023 No Comments READ MORE +

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?A . health policy B. system policy C. correlation policy D. access control policy E. health awareness policyView AnswerAnswer: A

August 24, 2023 No Comments READ MORE +

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS B. Cisco FTDv with one management interface and two traffic interfaces configured C. Cisco FTDv configured in routed mode and managed...

August 24, 2023 No Comments READ MORE +

Which function is the primary function of Cisco AMP threat Grid?

Which function is the primary function of Cisco AMP threat Grid?A . automated email encryption B. applying a real-time URI blacklist C. automated malware analysis D. monitoring network trafficView AnswerAnswer: C

August 23, 2023 No Comments READ MORE +

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)A . Outgoing traffic is allowed so users can communicate with outside organizations. B. Malware infects the messenger application on the user endpoint to send company data. C. Traffic is encrypted, which prevents visibility on...

August 23, 2023 No Comments READ MORE +

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?A . AMP B. AnyConnect C. DynDNS D. TalosView AnswerAnswer: D Explanation: When Umbrella receives a DNS request, it uses intelligence to determine if the request is safe, malicious or risky ― meaning the domain contains...

August 23, 2023 No Comments READ MORE +