What is a characteristic of Dynamic ARP Inspection?
What is a characteristic of Dynamic ARP Inspection?A . DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.B . In a typical network, make all ports as trusted except for the ports connecting to switches, which are...
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?A . PaaSB . XaaSC . IaaSD . SaaSView AnswerAnswer: A
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?A . RSA SecureIDB . Internal DatabaseC . Active DirectoryD . LDAPView AnswerAnswer: C
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)A . putB . optionsC . getD . pushE . connectView AnswerAnswer: AC Explanation: https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . security intelligenceB . impact flagsC . health monitoringD . URL filteringView AnswerAnswer: B
Which task can you perform to determine where each message was lost?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the tracking config command to enable message tracking.B . Generate a system report.C . Review the log files.D...
Which two capabilities does TAXII support? (Choose two.)
Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: BC
Which product meets all of these requirements?
An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?A . Cisco Prime InfrastructureB . Cisco Identity Services...
How is ICMP used an exfiltration technique?
How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...