Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engineB . white listC . RATD . outbreak filtersE . DLPView AnswerAnswer: AD
What is a commonality between DMVPN and FlexVPN technologies?
What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...
Which list contains the allowed recipient addresses?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address . Which list contains the allowed recipient addresses?A . SATB . BATC . HATD . RATView AnswerAnswer: D
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accountingB . assuranceC . automationD . authenticationE . encryptionView AnswerAnswer: BC Explanation: What Cisco DNA Center enables you to do Automate: Save time by using a single dashboard to manage and automate...
What is a characteristic of Firepower NGIPS inline deployment mode?
What is a characteristic of Firepower NGIPS inline deployment mode?A . ASA with Firepower module cannot be deployed.B . It cannot take actions such as blocking traffic.C . It is out-of-band from traffic.D . It must have inline interface pairs configured.View AnswerAnswer: D
Which type of attack is social engineering?
Which type of attack is social engineering?A . trojanB . phishingC . malwareD . MITMView AnswerAnswer: B Explanation: Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company...
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)A . packet decoderB . SIPC . modbusD . inline normalizationE . SSLView AnswerAnswer: BE Explanation: Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application layer...
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist CenterB . File Reputation CenterC . AMP Reputation CenterD . IP and Domain Reputation CenterView AnswerAnswer: D Explanation: Talos’ IP and Domain Data Center is the world’s most comprehensive...
Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A Explanation: The data plane of any network is responsible for handling data packets that are transported across the network. (The data plane is also sometimes called the forwarding plane.) Maybe...
Which ASA deployment mode can provide separation of management on a shared appliance?
Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone modeB . transparent firewall modeC . multiple context modeD . routed modeView AnswerAnswer: C