Which two activities can be done using Cisco DNA Center? (Choose two.)
Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: B E
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?A . to prevent theft of the endpointsB . because defense-in-depth stops at the networkC . to expose the endpoint to more...
How does Cisco Stealthwatch Cloud provide security for cloud environments?
How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection.B . It prevents exfiltration of sensitive data.C . It assigns Internet-based DNS protection for clients and serversD . It facilitates secure connectivity between public and private networksView AnswerAnswer: A
Which probe must be enabled for this type of profiling to work?
An engineer wants to automatically assign endpoints that have a specific OUl into a new endpoint group. Which probe must be enabled for this type of profiling to work?A . NetFlowB . DHCPC . SNMPD . NMAPView AnswerAnswer: D
Drag and drop the threats from the left onto examples of that threat on the right
Drag and drop the threats from the left onto examples of that threat on the right View AnswerAnswer:
What is the problem according to this command output?
Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...
Which tool should be used to accomplish this goal?
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?A . Security ManagerB . CloudlockC . Web Security ApplianceD . Cisco ISEView...
Which two cryptographic algorithms are used with IPsec? {Choose two.)
Which two cryptographic algorithms are used with IPsec? {Choose two.)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C E Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-mt/sec-sec-for-vpns-w-ips
What is the benefit of installing Cisco AMP for Endpoints on a network?
What is the benefit of installing Cisco AMP for Endpoints on a network?A . It provides operating system patches on the endpoints for security.B . It provides flow-based visibility for the endpoints' network connections.C . It protects endpoint systems through application control and real-time scanning.D . It enables behavioral analysis...
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A