Which form of attack is launched using botnets?

Which form of attack is launched using botnets?A . DDOSB . EIDDOSC . TCP floodD . virusView AnswerAnswer: A

March 10, 2022 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . profileB . urlC . terminalD . selfsignedView AnswerAnswer: A

March 10, 2022 No Comments READ MORE +

Which component of cisco umbrella architecture increases reliability of the service?

Which component of cisco umbrella architecture increases reliability of the service?A . Anycast IC . AMP Threat grid.D . Cisco Talos.E . BGP route reflector.View AnswerAnswer: D

March 10, 2022 No Comments READ MORE +

Which two preventive measures are used to control cross-site scripting? (Choose two)

Which two preventive measures are used to control cross-site scripting? (Choose two)A . Disable cookie inspection in the HTML inspection engineB . Incorporate contextual output encoding/escapingC . Enable client-side scripts on a per-domain basisD . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...

March 10, 2022 No Comments READ MORE +

Which action will accomplish this task?

An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?A . Set content settings to High.B . Configure the intelligent proxy.C . Use destination block lists.D...

March 9, 2022 No Comments READ MORE +

Which term describes this process?

Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats. Which term describes this process?A . deploymentB . consumptionC . authoringD . sharingView AnswerAnswer: A

March 9, 2022 No Comments READ MORE +

accomplish this goal?

An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?A . Cisco Defense OrchestratorB . Cisco SecureworksC . Cisco DNA CenterD . Cisco Configuration ProfessionalView AnswerAnswer: C

March 9, 2022 1 Comment READ MORE +

Which solution must be used for this implementation?

An organization wants to secure users, data and applications in the cloud. The solution must be API-based and operate as a cloud-native CASB. Which solution must be used for this implementation?A . Cisco Firepower Next-Generation FirewallB . Cisco Cloud Email SecurityC . Cisco UmbrellaD . Cisco Cloud lockView AnswerAnswer: D

March 9, 2022 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . registryB . bootloaderC . buffer modeD . user modeE . virtualView AnswerAnswer: CD

March 9, 2022 No Comments READ MORE +

Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container?

Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container?A . SDLCB . DockerC . LambdaD . ContivView AnswerAnswer: B

March 9, 2022 No Comments READ MORE +