In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . Smurf B. distributed denial of service C. cross-site scripting D. rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...
Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port Bounce B. CoA Terminate C. CoA Reauth D. CoA Session QueryView AnswerAnswer: C
What is the function of the Context Directory Agent?
What is the function of the Context Directory Agent?A . maintains users’ group memberships B. relays user authentication requests from Web Security Appliance to Active Directory C. reads the Active Directory logs to map IP addresses to usernames D. accepts user authentication requests on behalf of Web Security Appliance for...
What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirected B. Traffic from the inside network is redirected C. All TCP traffic is redirected D. Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configurefirepower-00.html
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?A . 1 B. 2 C. 6 D. 31View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networkingservices/config_guide_c17-663759.html
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparent B. redirection C. forward D. proxy gatewayView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf
How is DNS tunneling used to exfiltrate data out of a corporate network?
How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DES B. RSA C. DES D. AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation, as...
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . put B. options C. get D. push E. connectView AnswerAnswer: A,C Explanation: The ASA REST API gives you programmatic access to managing individual ASAs through a Representational State Transfer (REST) API. The API allows...
Which two descriptions of AES encryption are true? (Choose two)
Which two descriptions of AES encryption are true? (Choose two)A . AES is less secure than 3DES. B. AES is more secure than 3DES. C. AES can use a 168-bit key for encryption. D. AES can use a 256-bit key for encryption. E. AES encrypts and decrypts a key three...