What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is...
What is the problem according to this command output?
Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...
What are two rootkit types? (Choose two)
What are two rootkit types? (Choose two)A . bootloaderB . buffer modeC . registryD . virtualE . user modeView AnswerAnswer: A
Which API is used for Content Security?
Which API is used for Content Security?A . OpenVuln APIB . IOS XR APIC . NX-OS APID . AsyncOS APIView AnswerAnswer: D
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . profileB . urlC . terminalD . selfsignedView AnswerAnswer: A
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Secure the connection between the web and the app tier.B . Use prepared statements and parameterized queries.C . Check integer, float, or Boolean string parameters to ensure accurate values.D . Block SQL code execution in the...
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . URL FilteringC . Impact FlagsD . Health MonitoringView AnswerAnswer: C
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . routed modeB . active modeC . transparent modeD . inline modeE . passive monitor-only modeView AnswerAnswer: DE
Which type of attack is social engineering?
Which type of attack is social engineering?A . trojanB . malwareC . phishingD . MITMView AnswerAnswer: C