What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is...

October 31, 2021 No Comments READ MORE +

What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

October 30, 2021 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . bootloaderB . buffer modeC . registryD . virtualE . user modeView AnswerAnswer: A

October 29, 2021 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . OpenVuln APIB . IOS XR APIC . NX-OS APID . AsyncOS APIView AnswerAnswer: D

October 29, 2021 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . profileB . urlC . terminalD . selfsignedView AnswerAnswer: A

October 28, 2021 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Secure the connection between the web and the app tier.B . Use prepared statements and parameterized queries.C . Check integer, float, or Boolean string parameters to ensure accurate values.D . Block SQL code execution in the...

October 28, 2021 No Comments READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D

October 27, 2021 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . URL FilteringC . Impact FlagsD . Health MonitoringView AnswerAnswer: C

October 27, 2021 No Comments READ MORE +

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . routed modeB . active modeC . transparent modeD . inline modeE . passive monitor-only modeView AnswerAnswer: DE

October 27, 2021 No Comments READ MORE +

Which type of attack is social engineering?

Which type of attack is social engineering?A . trojanB . malwareC . phishingD . MITMView AnswerAnswer: C

October 27, 2021 No Comments READ MORE +