When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Vulnerabilities and ExposuresB . Common Exploits and VulnerabilitiesC . Common Security ExploitsD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: A

May 29, 2021 No Comments READ MORE +

Which actions must be performed in order to provide this capability?

organization has a Cisco ESA set up with policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation. Which actions must be performed in order to provide...

May 29, 2021 1 Comment READ MORE +

What are two rootkit types? (Choose two.)

What are two rootkit types? (Choose two.)A . user modeB . bootloaderC . virtualD . registryE . buffer modeView AnswerAnswer: AB

May 29, 2021 No Comments READ MORE +

How does Cisco Advanced Phishing Protection protect users?

How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It uses machine learning and real-time behavior analytics.E . It utilizes sensors that send messages securely.View AnswerAnswer: C

May 29, 2021 1 Comment READ MORE +

A network administrator configures command authorization for the admin5 user What is the admin5 user able to do on HQ_Router after this configuration?

Refer to the exhibit. A network administrator configures command authorization for the admin5 user What is the admin5 user able to do on HQ_Router after this configuration?A . complete no configurationsB . add subinterfacesC . complete all configurationsD . set the IP address of an interfaceView AnswerAnswer: A

May 29, 2021 No Comments READ MORE +

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Content Category BlockingB . File AnalysisC . Security Category BlockingD . Application ControlView AnswerAnswer: C

May 27, 2021 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . ProfileB . TerminalC . urlD . self-signedView AnswerAnswer: A

May 27, 2021 No Comments READ MORE +

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?A . BYOD onboardingB . Simple Certificate Enrollment ProtocolC . MAC authentication bypassD . client provisioningView AnswerAnswer: A

May 27, 2021 No Comments READ MORE +

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...

May 26, 2021 No Comments READ MORE +

What action would allow the attacker to gain access to machine 1 but not machine 2?

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . overflowing the...

May 26, 2021 No Comments READ MORE +