Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC
Which type of encryption uses a public key and private Key?
Which type of encryption uses a public key and private Key?A . asymmetricB . symmetricC . linearD . nonlinearView AnswerAnswer: A
What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?
What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA? A. Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Cisco WSA does not. B. Cisco CWS minimizes the load on the internal network and security infrastructure as compared to Cisco...
What is the benefit of integrating cisco ISE with a MDM solution?
What is the benefit of integrating cisco ISE with a MDM solution?A . It provides the ability to update other applications on the mobile device.B . It provides compliance checks for access to the network.C . It provides the ability to add applications to the mobile device through Cisco ISE...
How does Cisco Workload Optimization Manager help mitigate application performance issues?
How does Cisco Workload Optimization Manager help mitigate application performance issues?A . It deploys an AWS Lambda system.B . It automates resource resizing.C . It optimizes a flow path.D . it sets up a workload forensic score.View AnswerAnswer: B
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?A . ESPB . AHC . IKEv1D . IKEv2View AnswerAnswer: A
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D
Why is it important to implement MFA inside of an organization?
Why is it important to implement MFA inside of an organization?A . To prevent man-the-middle attacks from being successful.B . To prevent DoS attacks from being successful.C . To prevent brute force attacks from being successful.D . To prevent phishing attacks from being successful.View AnswerAnswer: C
What are two features of NetFlow flow monitoring? (Choose two.)
What are two features of NetFlow flow monitoring? (Choose two.)A . Copies all ingress flow information to an interface.B . Include the flow record and the flow importer.C . Can track ingress and egress information.D . Can be used to track multicast, MPLS, or bridged traffic.E . Does not required...
Which threat involves software being used to gain unauthorized access to a computer system?
Which threat involves software being used to gain unauthorized access to a computer system?A . ping of deathB . HTTP floodC . virusD . NTP amplificationView AnswerAnswer: C