Which form of attack is launched using botnets?
Which form of attack is launched using botnets?A . DDOSB . EIDDOSC . TCP floodD . virusView AnswerAnswer: A
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . profileB . urlC . terminalD . selfsignedView AnswerAnswer: A
Which component of cisco umbrella architecture increases reliability of the service?
Which component of cisco umbrella architecture increases reliability of the service?A . Anycast IC . AMP Threat grid.D . Cisco Talos.E . BGP route reflector.View AnswerAnswer: D
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which two preventive measures are used to control cross-site scripting? (Choose two)A . Disable cookie inspection in the HTML inspection engineB . Incorporate contextual output encoding/escapingC . Enable client-side scripts on a per-domain basisD . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...
Which action will accomplish this task?
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?A . Set content settings to High.B . Configure the intelligent proxy.C . Use destination block lists.D...
Which term describes this process?
Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats. Which term describes this process?A . deploymentB . consumptionC . authoringD . sharingView AnswerAnswer: A
accomplish this goal?
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?A . Cisco Defense OrchestratorB . Cisco SecureworksC . Cisco DNA CenterD . Cisco Configuration ProfessionalView AnswerAnswer: C
Which solution must be used for this implementation?
An organization wants to secure users, data and applications in the cloud. The solution must be API-based and operate as a cloud-native CASB. Which solution must be used for this implementation?A . Cisco Firepower Next-Generation FirewallB . Cisco Cloud Email SecurityC . Cisco UmbrellaD . Cisco Cloud lockView AnswerAnswer: D
What are two rootkit types? (Choose two)
What are two rootkit types? (Choose two)A . registryB . bootloaderC . buffer modeD . user modeE . virtualView AnswerAnswer: CD
Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container?
Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container?A . SDLCB . DockerC . LambdaD . ContivView AnswerAnswer: B