Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?A . to prevent theft of the endpointsB . because defense-in-depth stops at the networkC . to expose the endpoint to more...

April 2, 2021 No Comments READ MORE +

What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

What are the two types of managed Intercloud Fabric deployment models? (Choose two.)A . Public managedB . Service Provider managedC . Enterprise managedD . User managedE . Hybrid managedView AnswerAnswer: B C Explanation:

April 1, 2021 No Comments READ MORE +

What is the purpose of the My Devices Portal in a Cisco ISE environment?

What is the purpose of the My Devices Portal in a Cisco ISE environment?A . to manage and deploy antivirus definitions and patches on systems owned by the end userB . to register new laptops and mobile devicesC . to provision userless and agentless systemsD . to request a newly...

April 1, 2021 No Comments READ MORE +

What is the purpose of the certificate signing request when adding a new certificate for a server?

What is the purpose of the certificate signing request when adding a new certificate for a server?A . It is the password for the certificate that is needed to install it with.B . It provides the server information so a certificate can be created and signedC . It is the...

April 1, 2021 No Comments READ MORE +

What does the API do when connected to a Cisco security appliance?

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . gather network telemetry information from AMP for endpointsB . create an SNMP pull mechanism for managing AMPC . get the process and PID information from the computers in the networkD . gather the...

April 1, 2021 No Comments READ MORE +

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?A . Cisco CloudlockB . Cisco UmbrellaC . Cisco AMPD . Cisco App DynamicsView AnswerAnswer: A Explanation:

April 1, 2021 No Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)A . TACACS+B . central web authC . single sign-onD . multiple factor authE . local web authView AnswerAnswer: B E

April 1, 2021 No Comments READ MORE +

Which form of attack is launched using botnets?

Which form of attack is launched using botnets?A . virusB . EIDDOSC . TCP floodD . ODOSView AnswerAnswer: B

March 31, 2021 No Comments READ MORE +

Which public cloud provider supports the Cisco Next Generation Firewall Virtual?

Which public cloud provider supports the Cisco Next Generation Firewall Virtual?A . Google Cloud PlatformB . Red Hat Enterprise VisualizationC . VMware ESXiD . Amazon Web ServicesView AnswerAnswer: D Explanation:

March 31, 2021 No Comments READ MORE +

Drag and drop the descriptions from the left onto the correct protocol versions on the right.

Drag and drop the descriptions from the left onto the correct protocol versions on the right. View AnswerAnswer:

March 31, 2021 No Comments READ MORE +