Which Dos attack uses fragmented packets to crash a target machine?
Which Dos attack uses fragmented packets to crash a target machine?A . teardropB . MITMC . smurfD . LANDView AnswerAnswer: A
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)A . virtualizationB . middlewareC . operating systemsD . applicationsE . dataView AnswerAnswer: D E Explanation: https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/
Which attack is commonly associated with C and C++ programming languages?
Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D
Which type of authentication is in use?
Refer to the exhibit. Which type of authentication is in use?A . LDAP authentication for Microsoft OutlookB . POP3 authenticationC . SMTP relay server authenticationD . external user and relay mail authenticationView AnswerAnswer: A
Which outbreak control method is used to accomplish this task?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C
What is the benefit of installing Cisco AMP for Endpoints on a network?
What is the benefit of installing Cisco AMP for Endpoints on a network?A . It provides operating system patches on the endpoints for security.B . It provides flow-based visibility for the endpoints' network connections.C . It protects endpoint systems through application control and real-time scanning.D . It enables behavioral analysis...
How does Cisco Advanced Phishing Protection protect users?
How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It uses machine learning and real-time behavior analytics.E . It utilizes sensors that send messages securely.View AnswerAnswer: C Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-email-security/at-a-glance-c45-740894.pd
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
What are two benefits of Flexible NetFlow records? (Choose two)
What are two benefits of Flexible NetFlow records? (Choose two)A . They provide attack prevention by dropping the traffic.B . They allow the user to configure flow information to perform customized traffic identificationC . They provide accounting and billing enhancementsD . They provide monitoring of a wider range of IP...