In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C

March 17, 2021 No Comments READ MORE +

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco StealthwatchView AnswerAnswer: C

March 17, 2021 No Comments READ MORE +

Which two actions should be selected to allow the traffic to pass without inspection?

A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network . Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)A . permitB . trustC . resetD . allowE . monitorView AnswerAnswer:...

March 17, 2021 No Comments READ MORE +

What is the function of the Context Directory Agent?

What is the function of the Context Directory Agent?A . accepts user authentication requests on behalf of Web Security Appliance for user identificationB . relays user authentication requests from Web Security Appliance to Active DirectoryC . maintains users' group membershipsD . reads the Active Directory logs to map IP addresses...

March 17, 2021 No Comments READ MORE +

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)A . blocked portsB . simple custom detectionsC . command and controlD . allowed applicationsE . URLView AnswerAnswer: B D

March 17, 2021 No Comments READ MORE +

Which outbreak control method is used to accomplish this task?

An engineer is configuring AMP for endpoints and wants to block certain files from executing . Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C

March 17, 2021 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A

March 16, 2021 No Comments READ MORE +

What is managed by Cisco Security Manager?

What is managed by Cisco Security Manager?A . WSAB . ASAC . access point OD . ESAView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/products/collateral/security/security-manager/datasheet-C78-737182.html

March 16, 2021 No Comments READ MORE +

What must be configured, based on a predefined threshold, to address this issue?

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network . What must be configured, based on a predefined threshold, to address this issue?A . Bridge Protocol Data Unit guardB . embedded event monitoringC . access control listsD...

March 15, 2021 No Comments READ MORE +

Drag and drop the descriptions from the left onto the correct protocol versions on the right.

Drag and drop the descriptions from the left onto the correct protocol versions on the right. View AnswerAnswer:

March 15, 2021 No Comments READ MORE +