Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . ARP spoofingB . exploitsC . malwareD . eavesdroppingE . denial-of-service attacksView AnswerAnswer: BC

March 7, 2022 No Comments READ MORE +

Which type of encryption uses a public key and private Key?

Which type of encryption uses a public key and private Key?A . asymmetricB . symmetricC . linearD . nonlinearView AnswerAnswer: A

March 7, 2022 No Comments READ MORE +

What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?

What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA? A. Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Cisco WSA does not. B. Cisco CWS minimizes the load on the internal network and security infrastructure as compared to Cisco...

March 7, 2022 No Comments READ MORE +

What is the benefit of integrating cisco ISE with a MDM solution?

What is the benefit of integrating cisco ISE with a MDM solution?A . It provides the ability to update other applications on the mobile device.B . It provides compliance checks for access to the network.C . It provides the ability to add applications to the mobile device through Cisco ISE...

March 6, 2022 No Comments READ MORE +

How does Cisco Workload Optimization Manager help mitigate application performance issues?

How does Cisco Workload Optimization Manager help mitigate application performance issues?A . It deploys an AWS Lambda system.B . It automates resource resizing.C . It optimizes a flow path.D . it sets up a workload forensic score.View AnswerAnswer: B

March 6, 2022 No Comments READ MORE +

Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?

Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?A . ESPB . AHC . IKEv1D . IKEv2View AnswerAnswer: A

March 6, 2022 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . rootkit exploitB . SmurfC . distributed denial of serviceD . cross-site scriptingView AnswerAnswer: D

March 6, 2022 No Comments READ MORE +

Why is it important to implement MFA inside of an organization?

Why is it important to implement MFA inside of an organization?A . To prevent man-the-middle attacks from being successful.B . To prevent DoS attacks from being successful.C . To prevent brute force attacks from being successful.D . To prevent phishing attacks from being successful.View AnswerAnswer: C

March 5, 2022 No Comments READ MORE +

What are two features of NetFlow flow monitoring? (Choose two.)

What are two features of NetFlow flow monitoring? (Choose two.)A . Copies all ingress flow information to an interface.B . Include the flow record and the flow importer.C . Can track ingress and egress information.D . Can be used to track multicast, MPLS, or bridged traffic.E . Does not required...

March 5, 2022 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . ping of deathB . HTTP floodC . virusD . NTP amplificationView AnswerAnswer: C

March 5, 2022 No Comments READ MORE +