When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Vulnerabilities and ExposuresB . Common Exploits and VulnerabilitiesC . Common Security ExploitsD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cve/174/cve-addressed-1741.html

March 29, 2021 No Comments READ MORE +

What action is needed to authenticate the VPN?

0.0.0 command on host A The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Enter the same command on host B. B. Enter the command with a different password on host B. C. Change isakmp to ikev2 in the command on...

March 29, 2021 No Comments READ MORE +

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: B E

March 29, 2021 1 Comment READ MORE +

Which CoA type achieves this goal?

An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C

March 29, 2021 No Comments READ MORE +

Under which two circumstances is a CoA issued? (Choose two.)

Under which two circumstances is a CoA issued? (Choose two.)A . A new authentication rule was added to the policy on the Policy Service nodeB . An endpoint is deleted on the Identity Service Engine serverC . A new Identity Source Sequence is created and referenced in the authentication policyD...

March 26, 2021 No Comments READ MORE +

What must be used to share data between multiple security products?

What must be used to share data between multiple security products?A . Cisco Stealthwatch CloudB . Cisco Advanced Malware ProtectionC . Cisco Platform Exchange GridD . Cisco Rapid Threat ContainmentView AnswerAnswer: C

March 26, 2021 No Comments READ MORE +

In which cloud services model is the tenant responsible for virtual machine OS patching?

In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A

March 26, 2021 No Comments READ MORE +

Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications . Which vulnerability allows the attacker to see the passwords being transmitted in clear text?A ....

March 26, 2021 No Comments READ MORE +

Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)

Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)A . virtualizationB . middlewareC . operating systemsD . applicationsE . dataView AnswerAnswer: D E Explanation: https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/

March 26, 2021 No Comments READ MORE +

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?A . EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.B . EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.C . EPP focuses on...

March 26, 2021 No Comments READ MORE +