Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?

Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?A . advanced persistent threatB . targeted malwareC . drive-by spywareD . social activismView AnswerAnswer: A

October 23, 2018 No Comments READ MORE +

What mechanism does asymmetric cryptography use to secure data?

What mechanism does asymmetric cryptography use to secure data?A . a public/private key pairB . shared secret keysC . an RSA nonceD . an MD5 hashView AnswerAnswer: A

October 22, 2018 No Comments READ MORE +

In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?

In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?A . phishingB . pharmingC . solicitationD . secure transactionView AnswerAnswer: A

October 21, 2018 No Comments READ MORE +

When is the default deny all policy an exception in zone-based firewalls?

When is the default deny all policy an exception in zone-based firewalls?A . When traffic traverses two interfaces in in the same zoneB . When traffic terminates on the router via the self zoneC . When traffic sources from the router via the self zoneD . When traffic traverses two...

October 21, 2018 No Comments READ MORE +

What is the only permitted operation for processing multicast traffic on zone-based firewalls?

What is the only permitted operation for processing multicast traffic on zone-based firewalls?A . Only control plane policing can protect the control plane against multicast traffic.B . Stateful inspection of multicast traffic is supported only for the self-zone.C . Stateful inspection for multicast traffic is supported only between the self-zone...

October 21, 2018 No Comments READ MORE +

What is the effect of the given command sequence?

Refer to the exhibit. What is the effect of the given command sequence?A . It configures IKE Phase 1.B . It configures a site-to-site VPN tunnel.C . It configures a crypto policy with a key size of 14400.D . It configures IPSec Phase 2.View AnswerAnswer: A

October 20, 2018 No Comments READ MORE +

Which of the following statements about access lists are true? (Choose three.)

Which of the following statements about access lists are true? (Choose three.)A . Extended access lists should be placed as near as possible to the destinationB . Extended access lists should be placed as near as possible to the sourceC . Standard access lists should be placed as near as...

October 20, 2018 No Comments READ MORE +

Which type of mirroring does SPAN technology perform?

Which type of mirroring does SPAN technology perform?A . Remote mirroring over Layer 2B . Remote mirroring over Layer 3C . Local mirroring over Layer 2D . Local mirroring over Layer 3View AnswerAnswer: C

October 20, 2018 No Comments READ MORE +

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?

If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...

October 19, 2018 No Comments READ MORE +

Which Firepower Management Center feature detects and blocks exploits and hack attempts?

Which Firepower Management Center feature detects and blocks exploits and hack attempts?A . intrusion preventionB . advanced malware protectionC . content blockerD . file controlView AnswerAnswer: D

October 19, 2018 1 Comment READ MORE +