What must the administrator do to accomplish this?
A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?A . map SNMPv3 users to SNMP viewsB . set the password to be...
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?A . big dataB . storm centersC . sandboxingD . blocklistingView AnswerAnswer: C
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
Which attack is preventable by Cisco ESA but not by the Cisco WSA?A . buffer overflowB . DoSC . SQL injectionD . phishingView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-5/user_guide/b_ESA_Admin_Guide_13-5/m_advanced_phishing_protection.html
What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?A . Configure a Cisco FMC...
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?A . consumptionB . sharingC . analysisD . authoringView AnswerAnswer: A Explanation:
What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is...
What must be done to resolve this issue?
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done...
Which two mechanisms are used to control phishing attacks? (Choose two)
Which two mechanisms are used to control phishing attacks? (Choose two)A . Use antispyware softwareB . Implement email filtering techniques.C . Revoke expired CRL of the websites.D . Enable browser alerts for fraudulent websites.E . Define security group memberships.View AnswerAnswer: BD
What is a difference between a DoS attack and a DDoS attack?
What is a difference between a DoS attack and a DDoS attack?A . A DoS attack is where a computer is used to flood a server with UDP packets whereas a DDoS attack is where a computer is used to flood a server with TCP packets.B . A DoS attack...
How is data sent out to the attacker during a DNS tunneling attack?
How is data sent out to the attacker during a DNS tunneling attack?A . as part of the UDP'53 packet payloadB . as part of the domain nameC . as part of the TCP/53 packet headerD . as part of the DNS response packetView AnswerAnswer: B