Which VPN technology can support a multivendor environment and secure traffic between sites?
Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C Explanation: FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with...
Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A
What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...
Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . controlB . malwareC . URL filteringD . protectView AnswerAnswer: D
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)A . PortB . RuleC . SourceD . ApplicationE . ProtocolView AnswerAnswer: BC
Which two key and block sizes are valid for AES? (Choose two)
Which two key and block sizes are valid for AES? (Choose two)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: CD Explanation:...
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . exploitsB . ARP spoofingC . denial-of-service attacksD . malwareE . eavesdroppingView AnswerAnswer: AD Explanation: Malware means “malicious software”, is any software intentionally designed to cause damage to a...
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . CorrelationB . IntrusionC . Access ControlD . Network DiscoveryView AnswerAnswer: D Explanation: The Firepower System uses network discovery and identity policies to collect host, application, and user data for traffic on your...
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . ExchangeB . Pull messagingC . BindingD . CorrelationE . MitigatingView AnswerAnswer: BC Explanation: The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to those...