The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the management solutionView AnswerAnswer: D
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . multiple context modeB . user deployment of Layer 3 networksC . IPv6D . clusteringView AnswerAnswer: B Explanation: The ASAv on AWS supports the following features: + Support for Amazon EC2 C5 instances, the next generation of the...
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D
Why would a user choose an on-premises ESA versus the CES solution?
Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsite.B . Demand is unpredictable.C . The server team wants to outsource this service.D . ESA is deployed inline.View AnswerAnswer: A
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . Impact FlagsC . Health MonitoringD . URL FilteringView AnswerAnswer: B
What is the result of this Python script of the Cisco DNA Center API?
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds authentication to a switchB . adds a switch to Cisco DNA CenterC . receives information about a switchView AnswerAnswer: B
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig commandB . Configure the advancedproxyconfig command with the HTTPS subcommandC . Configure a small log-entry size.D . Configure a maximum packet size.View AnswerAnswer: B
Which threat involves software being used to gain unauthorized access to a computer system?
Which threat involves software being used to gain unauthorized access to a computer system?A . virusB . NTP amplificationC . ping of deathD . HTTP floodView AnswerAnswer: A
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity? A. DMVPN B. FlexVPN C. IPsec DVTI D. GET VPNView AnswerAnswer: D Explanation: Cisco‘s Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminate...
What are two rootkit types? (Choose two)
What are two rootkit types? (Choose two)A . registryB . virtualC . bootloaderD . user modeE . buffer modeView AnswerAnswer: CD Explanation: The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with the highest possible level of access privileges, similar...