Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Check integer, float, or Boolean string parameters to ensure accurate values.B . Use prepared statements and parameterized queries.C . Secure the connection between the web and the app tier.D . Write SQL code instead of using...
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)A . configure Active Directory Group Policies to push proxy settingsB . configure policy-based routing on the network infrastructureC . reference a Proxy Auto Config fileD . configure the proxy IP address...
What is a result of the configuration?
Refer to the exhibit . What is a result of the configuration?A . Traffic from the DMZ network is redirectedB . Traffic from the inside network is redirectedC . All TCP traffic is redirectedD . Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: The purpose of...
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . Group PolicyB . Access Control PolicyC . Device Management PolicyD . Platform Service PolicyView AnswerAnswer: D Explanation: Cisco...
What is the primary benefit of deploying an ESA in hybrid mode?
What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environmentB . It provides the lowest total cost of ownership by reducing the need for physical appliancesC . It provides maximum...
Which Cisco ASA command must be used?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA . Which Cisco ASA command must be used? A. flow-export destination inside 1.1.1.1 2055 B. ip flow monitor input C. ip flow-export destination 1.1.1.1 2055 D. flow exporterView AnswerAnswer: A Explanation: The syntax of this command is:...
Which technology reduces data loss by identifying sensitive information stored in public computing environments?
Which technology reduces data loss by identifying sensitive information stored in public computing environments?A . Cisco SDAB . Cisco FirepowerC . Cisco HyperFlexD . Cisco CloudlockView AnswerAnswer: D
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...
Which functions of an SDN architecture require southbound APIs to enable communication?
Which functions of an SDN architecture require southbound APIs to enable communication?A . SDN controller and the network elementsB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the cloudView AnswerAnswer: A Explanation: The Southbound API is used to communicate between Controllers...
What is the problem according to this command output?
Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status . What is the problem according to this...