Which two key and block sizes are valid for AES? (Choose two.)
Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C D
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco StealthwatchView AnswerAnswer: C
Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?
Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?A . Cisco WiSMB . Cisco ESAC . Cisco ISED . Cisco Prime InfrastructureView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118188-qanda-esa-00.html
Drag and drop the threats from the left onto examples of that threat on the right
Drag and drop the threats from the left onto examples of that threat on the right View AnswerAnswer:
What is a feature of the open platform capabilities of Cisco DNA Center?
What is a feature of the open platform capabilities of Cisco DNA Center?A . domain integrationB . intent-based APIsC . automation adaptersD . application adaptersView AnswerAnswer: B
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat? (Choose Two)
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat? (Choose Two)A . westbound APB . southbound APIC . northbound APID . eastbound APIView AnswerAnswer: B C
How is ICMP used an exfiltration technique?
How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...
Which probe must be enabled for this type of profiling to work?
An engineer wants to automatically assign endpoints that have a specific OUl into a new endpoint group. Which probe must be enabled for this type of profiling to work?A . NetFlowB . DHCPC . SNMPD . NMAPView AnswerAnswer: D
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)A . eavesdroppingB . denial-of-service attacksC . ARP spoofingD . malwareE . exploitsView AnswerAnswer: A E
Which SNMPv3 configuration must be used to support the strongest security possible?
Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andyB . asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...