Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.) A. Check integer, float, or Boolean string parameters to ensure accurate values. B. Use prepared statements and parameterized queries. C. Secure the connection between the web and the app tier. D. Write SQL code instead of using...
Which API is used for Content Security?
Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma12-0/api/b_SMA_API_12/test_chapter_01.html
What is the function of Cisco Cloudlock for data security?
What is the function of Cisco Cloudlock for data security? A. data loss prevention B. controls malicious cloud apps C. detects anomalies D. user and entity behavior analyticsView AnswerAnswer: A Explanation: https://umbrellA.cisco.com/products/casb
How is Cisco Umbrella configured to log only security events?
How is Cisco Umbrella configured to log only security events? A. per policy B. in the Reporting settings C. in the Security Settings section D. per network in the Deployments sectionView AnswerAnswer: A Explanation: https://docs.umbrellA.com/deployment-umbrella/docs/log-management
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)A . authentication server: Cisco Identity Service EngineB . supplicant: Cisco AnyConnect ISE Posture moduleC . authenticator: Cisco Catalyst switchD . authenticator: Cisco Identity Services EngineE . authentication server: Cisco Prime InfrastructureView AnswerAnswer: AC Explanation: https://www.lookingpoint.com/blog/ise-series-802.1x
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D Explanation: https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
How does Cisco Stealthwatch Cloud provide security for cloud environments?
How does Cisco Stealthwatch Cloud provide security for cloud environments? A. It delivers visibility and threat detection. B. It prevents exfiltration of sensitive datA. C. It assigns Internet-based DNS protection for clients and servers. D. It facilitates secure connectivity between public and private networks.View AnswerAnswer: A Explanation: https://www.content.shi.com/SHIcom/ContentAttachmentImages/SharedResources/FBLP/Cis co/Cisco-091919-Simple-IT-Whitepaper.pdf
What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...
Which two solutions mitigate the risk of this ransomware infection?
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)A . Configure a posture policy in Cisco Identity Services Engine...