Which technology must be used to implement these requirements?
An organization wants to secure data in a cloud environment Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and...
What must be configured to meet these requirements?
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access. The Cisco ESA must also join a cluster machine using preshared keys. What must be configured to meet these requirements?A . Enable two-factor authentication through a RADIUS server and then...
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . SMTPB . pxGridC . STIXD . XMPPView AnswerAnswer: C
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
Which type of dashboard does Cisco DNA Center provide for complete control of the network?A . service managementB . centralized managementC . application managementD . distributed managementView AnswerAnswer: B Explanation: Cisco's DNA Center is the only centralized network management system to bring all of this functionality into a single pane...
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?A . malware installationB . command-and-control communicationC . network footprintingD . data exfiltrationView AnswerAnswer: A
Which additional command is required to complete the flow record?
An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1.1.1.1 using the flow record Stea!thwatch406397954 command. Which additional command is required to complete the flow record?A . transport udp 2055B . match ipv4 ttlC . cache timeout active 60D . destination...
Why should the organization select either Platform as a Service or Infrastructure as a Service for this environment?
An organization is selecting a cloud architecture and does not want to be responsible for patch management of the operating systems. Why should the organization select either Platform as a Service or Infrastructure as a Service for this environment?A . Platform as a Service because the customer manages the operating...
to ensure that the addition of the node will be successful when inputting the FQDN?
An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?A . Change the IP address of the new Cisco ISE node to the same network as the others.B...
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect systems with an up-to-date antimalware program.D . Protect against input validation and character escapes in...
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?A . to ensure that assets are secure from malicious links on and off the corporate networkB . to protect the endpoint against malicious file transfersC . to establish secure VPN connectivity to the corporate networkD...