Why would a user choose an on-premises ESA versus the CES solution?

Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsiteB . Demand is unpredictableC . The server team wants to outsource this service.D . ESA is deployed inlineView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)A . eavesdroppingB . denial-of-service attacksC . ARP spoofingD . malwareE . exploitsView AnswerAnswer: A E

March 21, 2021 No Comments READ MORE +

Which public cloud provider supports the Cisco Next Generation Firewall Virtual?

Which public cloud provider supports the Cisco Next Generation Firewall Virtual?A . Google Cloud PlatformB . Red Hat Enterprise VisualizationC . VMware ESXiD . Amazon Web ServicesView AnswerAnswer: D Explanation:

March 21, 2021 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . profileC . terminalD . selfsignedView AnswerAnswer: B

March 21, 2021 No Comments READ MORE +

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...

March 20, 2021 No Comments READ MORE +

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)A . PutB . OptionC . GetD . PushE . ConnectView AnswerAnswer: A C

March 20, 2021 No Comments READ MORE +

Which Dos attack uses fragmented packets to crash a target machine?

Which Dos attack uses fragmented packets to crash a target machine?A . teardropB . MITMC . smurfD . LANDView AnswerAnswer: A

March 20, 2021 No Comments READ MORE +

How does Cisco Advanced Phishing Protection protect users?

How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It uses machine learning and real-time behavior analytics.E . It utilizes sensors that send messages securely.View AnswerAnswer: C Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-email-security/at-a-glance-c45-740894.pd

March 20, 2021 No Comments READ MORE +

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: B E

March 20, 2021 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D

March 20, 2021 No Comments READ MORE +