Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...
What is the primary role of the Cisco Email Security Appliance?
What is the primary role of the Cisco Email Security Appliance?A . Mail Submission AgentB . Mail Transfer AgentC . Mail Delivery AgentD . Mail User AgentView AnswerAnswer: B Explanation: Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and...
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile.B . It defines a traffic baseline for traffic anomaly deduction.C . It inspects hosts that meet the profile with more intrusion rules.D . It blocks...
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . transparent modeB . routed modeC . inline modeD . active modeE . passive monitor-only modeView AnswerAnswer: CE Explanation: You can configure your ASA FirePOWER module using one of the following deployment models: You can configure your...
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect against input validation and character escapes in the endpoint.D . Install a spam and virus...
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport mechanism (data exchange) of cyber threat intelligence...
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)A . It can handle explicit HTTP requests.B . It requires a PAC file for the client web browser.C . It requires a proxy for the client web browser.D . WCCP v2-enabled devices can automatically redirect...
What does the API do when connected to a Cisco security appliance?
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . get the process and PID information from the computers in the networkB . create an SNMP pull mechanism for managing AMPC . gather network telemetry information from AMP for endpointsD . gather the...
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: DE Explanation: Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based email...