Which mechanism should the engineer configure to accomplish this goal?
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?A . mirror portB . NetFlowC . FlowD . VPC...
Which command was used to display this output?
Refer to the exhibit. Which command was used to display this output?A . show dotlx all summaryB . show dotlx interface gil/O/12C . show dotlx allD . show dotl1xView AnswerAnswer: C
What must be done on the Cisco ESA to accomplish this goal?
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be preventec from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?A . Use Bounce VerificationB . Configure incoming content filters.C . Configure Directory Harvest Attack PreventionD . Bypass...
What are two reasons for implementing a multifactor authentication solution such as Cisco Duo Security provide to an organization? (Choose two)
What are two reasons for implementing a multifactor authentication solution such as Cisco Duo Security provide to an organization? (Choose two)A . flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notificationsB . single sign-on access to on-premises and cloud applicationsC . integration with 802....
What provides visibility and awareness into what is currently occurring on the network?
What provides visibility and awareness into what is currently occurring on the network?A . CMXB . WMIC . Prime InfrastructureD . TelemetryView AnswerAnswer: D
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . EavesdroppingB . ARP spoofingC . denial-of-service attacksD . malwareE . exploitsView AnswerAnswer: DE
Which protocol provides the strongest throughput performance when using Cisco Anyconnect VPN?
Which protocol provides the strongest throughput performance when using Cisco Anyconnect VPN?A . TLSv1,1B . TLSv1. 2C . TLSv1D . DTLSv1View AnswerAnswer: D
What is an attribute of the DevSecOps process?
What is an attribute of the DevSecOps process?A . security scanning and theoretical vulnerabilitiesB . isolated security teamC . mandated security controls and check listsD . development securityView AnswerAnswer: D
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
Which factor must be considered when choosing the on-premise solution over the cloud-based one?A . With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the productB . With an on-premise solution, the customer is responsible for the installation and...
what is a key difference between Cisco Firepower and Cisco ASA?
what is a key difference between Cisco Firepower and Cisco ASA?A . Cisco Firepower provides identity based access control while Cisco ASA does not.B . Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does notC . Cisco ASA provides SSL inspection while Cisco Firepower does not.D . Cisco...