In a security context, which action can you take to address compliance?
In a security context, which action can you take to address compliance?A . Implement rules to prevent a vulnerability.B . Correct or counteract a vulnerability.C . Reduce the severity of a vulnerability.D . Follow directions from the security appliance manufacturer to remediate a vulnerability.View AnswerAnswer: A
What encryption technology has broadest platform support
What encryption technology has broadest platform supportA . hardwareB . middlewareC . SoftwareD . File levelView AnswerAnswer: C
Which prevent the company data from modification even when the data is in transit?
Which prevent the company data from modification even when the data is in transit?A . ConfidentialityB . IntegrityC . VailabilityView AnswerAnswer: B
What is the effect of the given command sequence?
Refer to the exhibit. What is the effect of the given command sequence?A . It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.B . It defines IPSec policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.C . It defines IKE policy for traffic...
Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)
Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)A . outbreak filterB . buffer overflow filterC . bayesian filterD . web reputation filterE . exploit filteringView AnswerAnswer: A, D Explanation: Cisco IronPort Outbreak Filters provide a critical first layer of defense against new outbreaks. With...
Which feature allows a dynamic PAT pool to select the next address in the PAT pool instead of the next port of an existing address?
Which feature allows a dynamic PAT pool to select the next address in the PAT pool instead of the next port of an existing address?A . next IPB . round robinC . dynamic rotationD . NAT address rotationView AnswerAnswer: B
Which statements about reflexive access lists are true? (Choose three.)
Which statements about reflexive access lists are true? (Choose three.)A . Reflexive access lists create a permanent ACEB . Reflexive access lists approximate session filtering using the established keywordC . Reflexive access lists can be attached to standard named IP ACLsD . Reflexive access lists support UDP sessionsE . Reflexive...
Which firepower preprocessor block traffic based on IP?
Which firepower preprocessor block traffic based on IP?A . Signature-BasedB . Policy-BasedC . Anomaly-BasedD . Reputation-BasedView AnswerAnswer: D
According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)
According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)A . BOOTPB . TFTPC . DNSD . MABE . HTTPF . 802.1xView AnswerAnswer: A,B,C
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?A . STP elects the root bridgeB . STP selects the root portC . STP selects the designated portD . STP blocks one of the portsView AnswerAnswer: A