Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B
Which statement about IOS zone-based firewalls is true?
Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?A . It decrypts HTTPS application traffic for unauthenticated users.B . It alerts users when the WSA decrypts their traffic.C . It decrypts HTTPS application traffic for authenticated users.D . It provides enhanced HTTPS application...
Which attack is commonly associated with C and C++ programming languages?
Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D Explanation: A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program...
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which two preventive measures are used to control cross-site scripting? (Choose two)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...
Which API is used for Content Security?
Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D
Which form of attack is launched using botnets?
Which form of attack is launched using botnets?A . EIDDOSB . virusC . DDOSD . TCP floodView AnswerAnswer: C Explanation: A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them. Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such...
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission.B . The attack is fragmented into groups of 8 octets before transmission.C . Short synchronized bursts of traffic are used to disrupt TCP connections.D . Malformed...
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . SmurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...