The AMP cloud is configured to report AMP Connector scan events from Windows machines that belong to the audit group to the FMC However, the scanned events are not showing up in the FMC which possible cause true?

Refer to the exhibit. The AMP cloud is configured to report AMP Connector scan events from Windows machines that belong to the audit group to the FMC However, the scanned events are not showing up in the FMC which possible cause true?A . There is a possible issue with certificate...

December 14, 2019 No Comments READ MORE +

How many additional PSNs can you add to this deployment?

You have an ISE deployment with two nodes that are configured as PAN and MnT (Primary and Secondary), and 4 Policy Services Nodes. How many additional PSNs can you add to this deployment?A . 0B . 1C . 3D . 5E . 4F . 2View AnswerAnswer: B 

December 14, 2019 No Comments READ MORE +

Which set of commands do you run on the ASA to achieve this goal?

A device on your internal network is hard-coded with two DNS server on the Internet (1.1.1.53, 2.2.2.53). However, you want to send all requests to your OpenDNS server (208.67.222.222). Which set of commands do you run on the ASA to achieve this goal?A . Static (inside, outside) source any 1.1.1.53destination...

December 14, 2019 No Comments READ MORE +

What are the advantages of using LDAP over AD is true?

What are the advantages of using LDAP over AD is true?A . LDAP allows for granular policy control, whereas Ad does notB . LDAP provides for faster authenticationC . LDAP can be configured to use primary and secondary server, whereas AD cannotD . LDAP does not require ISE to join...

December 13, 2019 No Comments READ MORE +

Which statement about the traffic Substitution and insertion attack is true?

Which statement about the traffic Substitution and insertion attack is true?A . It substitutes by performing action slower than normal not exceeding thresholdB . it is used for reconnaissanceC . It substitutes payload data in a different format but has the same meaningD . It is form of a dos...

December 13, 2019 No Comments READ MORE +

Which statement about Sender Base reputation scoring on an ESA device is true?

Which statement about Sender Base reputation scoring on an ESA device is true?A . Application traffic from known bad sites can be throttled or blockedB . By default, all messages with a score below zero are dropped or throttledC . Mail with scores in the medium range can be automatically...

December 13, 2019 No Comments READ MORE +

Which two steps can you take to avoid this sort of rogue behavior?

A sneaky employee using an Android phone on your network has disabled DHCP, enabled its firewall, and modified its Http user-agent header to fool ISE into profiling it as a windows 10 machine connected to the wireless network. this user can now get authorization for unrestricted network access using his...

December 13, 2019 No Comments READ MORE +

Which statement about stealth scan is true?

Which statement about stealth scan is true?A . It evades network auditing toolsB . It relies on ICMP "port unreachable" message to determine if the port is openC . It is used to find the ports that already have an existing vulnerability to exploitD . It checks the firewall deployment...

December 12, 2019 No Comments READ MORE +

Which function of MSE in the WIPS architecture is true?

Which function of MSE in the WIPS architecture is true?A . detects over-the-air traffic network anomalies and attacksB . scans channels without impacting data-serving radiosC . provides view of security threatsD . performs the correlation of security eventsE . channel to connect with ISE to implement CoAF . applies rogue...

December 12, 2019 No Comments READ MORE +

Which description of the AES encryption algorithm is true?

Which description of the AES encryption algorithm is true?A . It provides only data integrityB . Theoretically 3DES is more secure than AESC . Reapplying the same encryption key three times makes rt less vulnerable than 3DESD . It does not use the substitution and permutation principleE . It uses...

December 11, 2019 No Comments READ MORE +