- All Exams Instant Download
What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: D, E Explanation: Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based...
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . transparent modeB . routed modeC . inline modeD . active modeE . passive monitor-only modeView AnswerAnswer: C, D Explanation: You can configure your ASA FirePOWER module using one of the following deployment models: You can configure...
Which option is the main function of Cisco Firepower impact flags?
Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They highlight known and suspected malicious IP addresses in reports.C . They correlate data about intrusions and vulnerability.D . They identify data that the ASA sends to the Firepower module.View...
Which ASA deployment mode meets these needs?
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C
Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...
Which IPS engine detects ARP spoofing?
Which IPS engine detects ARP spoofing?A . Atomic ARP EngineB . Service Generic EngineC . ARP Inspection EngineD . AIC EngineView AnswerAnswer: A
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...