In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . Smurf B. distributed denial of service C. cross-site scripting D. rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...

August 21, 2023 No Comments READ MORE +

Which CoA type achieves this goal?

An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port Bounce B. CoA Terminate C. CoA Reauth D. CoA Session QueryView AnswerAnswer: C

August 21, 2023 No Comments READ MORE +

What is the function of the Context Directory Agent?

What is the function of the Context Directory Agent?A . maintains users’ group memberships B. relays user authentication requests from Web Security Appliance to Active Directory C. reads the Active Directory logs to map IP addresses to usernames D. accepts user authentication requests on behalf of Web Security Appliance for...

August 21, 2023 No Comments READ MORE +

What is a result of the configuration?

Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirected B. Traffic from the inside network is redirected C. All TCP traffic is redirected D. Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configurefirepower-00.html

August 21, 2023 No Comments READ MORE +

Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?

Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?A . 1 B. 2 C. 6 D. 31View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networkingservices/config_guide_c17-663759.html

August 21, 2023 No Comments READ MORE +

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparent B. redirection C. forward D. proxy gatewayView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf

August 21, 2023 No Comments READ MORE +

How is DNS tunneling used to exfiltrate data out of a corporate network?

How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...

August 21, 2023 No Comments READ MORE +

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DES B. RSA C. DES D. AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation, as...

August 20, 2023 No Comments READ MORE +

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . put B. options C. get D. push E. connectView AnswerAnswer: A,C Explanation: The ASA REST API gives you programmatic access to managing individual ASAs through a Representational State Transfer (REST) API. The API allows...

August 20, 2023 No Comments READ MORE +

Which two descriptions of AES encryption are true? (Choose two)

Which two descriptions of AES encryption are true? (Choose two)A . AES is less secure than 3DES. B. AES is more secure than 3DES. C. AES can use a 168-bit key for encryption. D. AES can use a 256-bit key for encryption. E. AES encrypts and decrypts a key three...

August 20, 2023 No Comments READ MORE +