What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?A . Cisco CloudlockB . Cisco App DynamicsC . Cisco UmbrellaD . Cisco AMPView AnswerAnswer: A
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?A . Enable IP Layer enforcementB . Enable Intelligent ProxyC . Activate the Advanced Malware Protection licenseD . Activate SSL decryption.View AnswerAnswer: B
which two ways does a system administrator send web traffic transparently to the Cisco WSA? (Choose two)
which two ways does a system administrator send web traffic transparently to the Cisco WSA? (Choose two)A . configure policy-based routing on the network infrastructureB . configure the proxy IP address in the web-browser settingsC . configure AD Group Policies to push proxy settingsD . use Web Cache Communication ProtocolE...
Which two actions should be selected to allow the traffic to pass without inspection?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)A . permitB . trustC . resetD . allowE . monitorView AnswerAnswer: B...
Which mechanism should the engineer configure to accomplish this goal?
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?A . mirror portB . NetFlowC . FlowD . VPC...
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?A . Platform Exchange GridB . Advanced Malware ProtectionC . Multifactor Platform IntegrationD . Firepower Threat DefenseView AnswerAnswer: A Explanation:
Why would a user choose an on-premises ESA versus the CES solution?
Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsiteB . Demand is unpredictableC . The server team wants to outsource this service.D . ESA is deployed inlineView AnswerAnswer: A
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)A . Check integer, float, or Boolean string parameters to ensure accurate valuesB . Use prepared statements and parameterized queries.C . Secure the connection between the web and the app tierD . Write SQL code instead of using...
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)A . Create an ACL to allow UDP traffic on port 9996.B . Enable NetFlow Version 9.C . Create a class map to match interesting traffic.D . Apply NetFlow Exporter to the outside interface in the inbound...
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C