Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?
Your security team has discovered a malicious program that has been harvesting the CEO's email messages and the company's user database for the last 6 months. What type of attack did your team discover?A . advanced persistent threatB . targeted malwareC . drive-by spywareD . social activismView AnswerAnswer: A
What mechanism does asymmetric cryptography use to secure data?
What mechanism does asymmetric cryptography use to secure data?A . a public/private key pairB . shared secret keysC . an RSA nonceD . an MD5 hashView AnswerAnswer: A
In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?
In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?A . phishingB . pharmingC . solicitationD . secure transactionView AnswerAnswer: A
When is the default deny all policy an exception in zone-based firewalls?
When is the default deny all policy an exception in zone-based firewalls?A . When traffic traverses two interfaces in in the same zoneB . When traffic terminates on the router via the self zoneC . When traffic sources from the router via the self zoneD . When traffic traverses two...
What is the only permitted operation for processing multicast traffic on zone-based firewalls?
What is the only permitted operation for processing multicast traffic on zone-based firewalls?A . Only control plane policing can protect the control plane against multicast traffic.B . Stateful inspection of multicast traffic is supported only for the self-zone.C . Stateful inspection for multicast traffic is supported only between the self-zone...
What is the effect of the given command sequence?
Refer to the exhibit. What is the effect of the given command sequence?A . It configures IKE Phase 1.B . It configures a site-to-site VPN tunnel.C . It configures a crypto policy with a key size of 14400.D . It configures IPSec Phase 2.View AnswerAnswer: A
Which of the following statements about access lists are true? (Choose three.)
Which of the following statements about access lists are true? (Choose three.)A . Extended access lists should be placed as near as possible to the destinationB . Extended access lists should be placed as near as possible to the sourceC . Standard access lists should be placed as near as...
Which type of mirroring does SPAN technology perform?
Which type of mirroring does SPAN technology perform?A . Remote mirroring over Layer 2B . Remote mirroring over Layer 3C . Local mirroring over Layer 2D . Local mirroring over Layer 3View AnswerAnswer: C
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?
If a packet matches more than one class map in an individual feature type's policy map, how does the ASA handle the packet?A . The ASA will apply the actions from only the first matching class map it finds for the feature type.B . The ASA will apply the actions...
Which Firepower Management Center feature detects and blocks exploits and hack attempts?
Which Firepower Management Center feature detects and blocks exploits and hack attempts?A . intrusion preventionB . advanced malware protectionC . content blockerD . file controlView AnswerAnswer: D