Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Secure the connection between the web and the app tier.B . Use prepared statements and parameterized queries.C . Check integer, float, or Boolean string parameters to ensure accurate values.D . Block SQL code execution in the...

March 9, 2022 No Comments READ MORE +

Which solution would be best for this and why?

A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment. They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?A...

March 9, 2022 1 Comment READ MORE +

Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?

Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?A . Cisco TetrationB . Cisco ISEC . Cisco AMP for NetworkD . Cisco AnyConnectView AnswerAnswer: C

March 9, 2022 No Comments READ MORE +

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?A . BYOD on boarding.B . Simple Certificate Enrollment Protocol.C . Client provisioning.D . MAC authentication bypass.View AnswerAnswer: A Explanation: When supporting personal devices on a corporate network, you must protect...

March 8, 2022 No Comments READ MORE +

What is the function of the Context Directory Agent?

What is the function of the Context Directory Agent?A . reads the Active Directory logs to map IP addresses to usernamesB . accepts user authentication requests on behalf of Web Security Appliance for user identificationC . relays user authentication requests from Web Security Appliance to Active DirectoryD . maintains users'...

March 8, 2022 No Comments READ MORE +

What must be done in order to ensure that the created is functioning as it should?

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file...

March 8, 2022 No Comments READ MORE +

What are two Trojan malware attacks? (Choose two.)

What are two Trojan malware attacks? (Choose two.)A . rootkitB . frontdoorC . smurfD . backdoorE . syncView AnswerAnswer: AD

March 8, 2022 No Comments READ MORE +

Which protocol accomplishes this goal?

An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence. Which protocol accomplishes this goal?A . AES-192B . IKEv1C . AES-256D . ESPView AnswerAnswer: D

March 8, 2022 No Comments READ MORE +

What must be done to ensure that all devices can communicate together?

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management port conflicts with other communications on the network and must be changed. What must be done to ensure that all devices can communicate together?A . Set the sftunnel to go through the Cisco FTC ....

March 8, 2022 No Comments READ MORE +

What is the reason for this failure?

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures. The configuration is created in the simple detection policy section, but it does not work. What is the reason for this failure?A . The administrator must upload the file instead of the hash for...

March 7, 2022 No Comments READ MORE +