What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirected.B . Traffic from the inside network is redirected.C . All TCP traffic is redirected.D . Traffic from the inside and DMZ networks is redirected.View AnswerAnswer: B
Which ASA deployment mode can provide separation of management on a shared appliance?
Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone modeB . transparent firewall modeC . multiple context modeD . routed modeView AnswerAnswer: C
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)A . SIPB . inline normalizationC . SSLD . packet decoderE . modbusView AnswerAnswer: AC Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Application_Layer_Preprocessors.html
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Device_Management_Basics.html#ID-2242-0000069d
Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/security/asa/special/unified-communications/guide/unifiedcomm/unified-comm-tlsproxy.html
Why would a user choose an on-premises ESA versus the CES solution?
Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsite.B . Demand is unpredictable.C . The server team wants to outsource this service.D . ESA is deployed inline.View AnswerAnswer: A
Which two activities can be done using Cisco DNA Center? (Choose two.)
Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: BE Explanation: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-andmanagement/dna-center/1-2-1/user_guide/b_dnac_ug_1_2_1/b_dnac_ug_1_2_chapter_00.pdf
Which two preventive measures are used to control cross-site scripting? (Choose two.)
Which two preventive measures are used to control cross-site scripting? (Choose two.)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . SameSite cookie attribute should not...
Which command was used to display this output?
Refer to the exhibit. Which command was used to display this output? A. show dot1x all B. show dot1x C. show dot1x all summary D. show dot1x interface gi1/0/12View AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe- 3se/3850/secuser-8021x-xe-3se-3850-book/config-ieee-802x-pbA.html
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: AC Explanation: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html