Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?

Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?A . Cisco WiSMB . Cisco ESAC . Cisco ISED . Cisco Prime InfrastructureView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118188-qanda-esa-00.html

March 24, 2021 No Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D

March 24, 2021 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

March 24, 2021 No Comments READ MORE +

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B

March 24, 2021 No Comments READ MORE +

What is the purpose of the My Devices Portal in a Cisco ISE environment?

What is the purpose of the My Devices Portal in a Cisco ISE environment?A . to manage and deploy antivirus definitions and patches on systems owned by the end userB . to register new laptops and mobile devicesC . to provision userless and agentless systemsD . to request a newly...

March 24, 2021 1 Comment READ MORE +

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?A . Platform Exchange GridB . Advanced Malware ProtectionC . Multifactor Platform IntegrationD . Firepower Threat DefenseView AnswerAnswer: A Explanation:

March 24, 2021 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

March 24, 2021 No Comments READ MORE +

What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

What are the two types of managed Intercloud Fabric deployment models? (Choose two.)A . Public managedB . Service Provider managedC . Enterprise managedD . User managedE . Hybrid managedView AnswerAnswer: B C Explanation:

March 23, 2021 No Comments READ MORE +

Which type of authentication is in use?

Refer to the exhibit. Which type of authentication is in use?A . LDAP authentication for Microsoft OutlookB . POP3 authenticationC . SMTP relay server authenticationD . external user and relay mail authenticationView AnswerAnswer: A

March 23, 2021 No Comments READ MORE +

What are two functions of secret key cryptography? (Choose two.)

What are two functions of secret key cryptography? (Choose two.)A . key selection without integer factorizationB . utilization of different keys for encryption and decryptionC . utilization of large prime number iterationsD . utilization of less memoryE . provides the capability to only know the key on one sideView AnswerAnswer:...

March 23, 2021 No Comments READ MORE +