In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco StealthwatchView AnswerAnswer: C
Which two actions should be selected to allow the traffic to pass without inspection?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network . Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)A . permitB . trustC . resetD . allowE . monitorView AnswerAnswer:...
What is the function of the Context Directory Agent?
What is the function of the Context Directory Agent?A . accepts user authentication requests on behalf of Web Security Appliance for user identificationB . relays user authentication requests from Web Security Appliance to Active DirectoryC . maintains users' group membershipsD . reads the Active Directory logs to map IP addresses...
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)A . blocked portsB . simple custom detectionsC . command and controlD . allowed applicationsE . URLView AnswerAnswer: B D
Which outbreak control method is used to accomplish this task?
An engineer is configuring AMP for endpoints and wants to block certain files from executing . Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A
What is managed by Cisco Security Manager?
What is managed by Cisco Security Manager?A . WSAB . ASAC . access point OD . ESAView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/products/collateral/security/security-manager/datasheet-C78-737182.html
What must be configured, based on a predefined threshold, to address this issue?
An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network . What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD...
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
Drag and drop the descriptions from the left onto the correct protocol versions on the right. View AnswerAnswer: