When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Vulnerabilities and ExposuresB . Common Exploits and VulnerabilitiesC . Common Security ExploitsD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cve/174/cve-addressed-1741.html

April 10, 2021 No Comments READ MORE +

Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: D

April 10, 2021 No Comments READ MORE +

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . ip device-trackingB . aaa new-modelC . aaa server radius dynamic-authorD . auth-type allView AnswerAnswer: C

April 10, 2021 No Comments READ MORE +

Which Cisco ASA command must be used?

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used? A. flow exporter <name> B. ip flow monitor<name> input C. ip flow-export destination 1.1.1.1 2055 D. flow-export destination inside 1.1.1.1 2055View AnswerAnswer: D

April 10, 2021 No Comments READ MORE +

Which tool should be used to accomplish this goal?

A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?A . Security ManagerB . CloudlockC . Web Security ApplianceD . Cisco ISEView...

April 10, 2021 No Comments READ MORE +

What features does Cisco FTDv provide over ASAv?

What features does Cisco FTDv provide over ASAv?A . Cisco FTDv runs on VMWare while ASAv does notB . Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does notC . Cisco FTDv supports URL filtering while ASAv does notD . Cisco FTDv runs on AWS while ASAv does...

April 10, 2021 No Comments READ MORE +

Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?A . weak...

April 9, 2021 No Comments READ MORE +

How does Cisco Stealthwatch Cloud provide security for cloud environments?

How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection.B . It prevents exfiltration of sensitive data.C . It assigns Internet-based DNS protection for clients and serversD . It facilitates secure connectivity between public and private networksView AnswerAnswer: A

April 9, 2021 No Comments READ MORE +

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D

April 9, 2021 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two.)

Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: A B

April 9, 2021 No Comments READ MORE +