When is the best time to perform an anti-virus signature update?
When is the best time to perform an anti-virus signature update?A . Every time a new update is available.B . When the local scanner has detected a new virus.C . When a new virus is discovered in the wild.D . When the system detects a browser hook.View AnswerAnswer: A
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.
A specific URL has been identified as containing malware. What action can you take to block users from accidentally visiting the URL and becoming infected with malware.A . Enable URL filtering on the perimeter router and add the URLs you want to block to the router's local URL list.B ....
By which kind of threat is the victim tricked into entering username and password information at a disguised website?
By which kind of threat is the victim tricked into entering username and password information at a disguised website?A . SpoofingB . MalwareC . SpamD . PhishingView AnswerAnswer: D
What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)
What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)A . The Internet Key Exchange protocol establishes security associationsB . The Internet Key Exchange protocol provides data confidentialityC . The Internet Key Exchange protocol provides replay detectionD . The Internet Key Exchange protocol is responsible for...
While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPSec Phase 1 is down due to...
What is the FirePOWER impact flag used for?
What is the FirePOWER impact flag used for?A . A value that indicates the potential severity of an attack.B . A value that the administrator assigns to each signature.C . A value that sets the priority of a signature.D . A value that measures the application awareness.View AnswerAnswer: A
What is an advantage of implementing a Trusted Platform Module for disk encryption?
What is an advantage of implementing a Trusted Platform Module for disk encryption?A . It provides hardware authentication.B . It allows the hard disk to be transferred to another device without requiring re-encryption.disC . It supports a more complex encryption algorithm than other disk-encryption technologies.D . It can protect against...
What is the effect of the given command?
Refer to the exhibit. What is the effect of the given command?A . It merges authentication and encryption methods to protect traffic that matches an ACC . It configures the network to use a different transform set between peers.D . It configures encryption for MD5 HMAF . It configures authentication...
Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)
Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)A . EAPB . ASCIIC . PAPD . PEAPE . MS-CHAPv1F . MS-CHAPv2View AnswerAnswer: B,C,E
According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)
According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)A . BOOTPB . TFTPC . DNSD . MABE . HTTPF . 802.1xView AnswerAnswer: A,B,C