Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accountingB . encryptionC . assuranceD . automationE . authenticationView AnswerAnswer: CD
Which two mechanisms are used to control phishing attacks? (Choose two)
Which two mechanisms are used to control phishing attacks? (Choose two)A . Use antispyware softwareB . Implement email filtering techniques.C . Revoke expired CRL of the websites.D . Enable browser alerts for fraudulent websites.E . Define security group memberships.View AnswerAnswer: BD
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Endpoint Trust ListB . Secured Collaboration ProxyC . Certificate Trust ListD . Enterprise Proxy ServiceView AnswerAnswer: C
What is a commonality between DMVPN and Flex VPN technologies?
What is a commonality between DMVPN and Flex VPN technologies?A . Flex VPN and DMVPN use IS-IS routing protocol to communicate with spokesB . Flex VPN and DMVPN use the new key management protocolC . Flex VPN and DMVPN use the same hashing algorithmsD . IOS routers run the same...
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect systems with an up-to-date antimalware program.D . Protect against input validation and character escapes in...
What is a difference between Flex VPN and DMVPN?
What is a difference between Flex VPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, Flex VPN only uses IKEv1B . DMVPN uses only IKEv1 Flex VPN uses only IKEv2C . Flex VPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . Flex VPN uses IKEv1 or IKEv2, DMVPN uses only...
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which two behavioral patterns characterize a ping of death attack? (Choose two)A . Malformed packets are used to crash systems.B . The attack is fragmented into groups of 8 octets before transmission.C . The attack is fragmented into groups of 16 octets before transmission.D . Publicly accessible DNS servers are...
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . encryption methodB . username and passwordC . device serial numberD . registration keyView AnswerAnswer: D
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which two preventive measures are used to control cross-site scripting? (Choose two)A . Disable cookie inspection in the HTML inspection engineB . Incorporate contextual output encoding/escapingC . Enable client-side scripts on a per-domain basisD . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . time synchronizationB . network address translationsC . quality of serviceD . intrusion policyView AnswerAnswer: A