Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.) A. Check integer, float, or Boolean string parameters to ensure accurate values. B. Use prepared statements and parameterized queries. C. Secure the connection between the web and the app tier. D. Write SQL code instead of using...

January 30, 2021 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma12-0/api/b_SMA_API_12/test_chapter_01.html

January 30, 2021 No Comments READ MORE +

What is the function of Cisco Cloudlock for data security?

What is the function of Cisco Cloudlock for data security? A. data loss prevention B. controls malicious cloud apps C. detects anomalies D. user and entity behavior analyticsView AnswerAnswer: A Explanation: https://umbrellA.cisco.com/products/casb

January 30, 2021 No Comments READ MORE +

How is Cisco Umbrella configured to log only security events?

How is Cisco Umbrella configured to log only security events? A. per policy B. in the Reporting settings C. in the Security Settings section D. per network in the Deployments sectionView AnswerAnswer: A Explanation: https://docs.umbrellA.com/deployment-umbrella/docs/log-management

January 30, 2021 No Comments READ MORE +

When wired 802.1X authentication is implemented, which two components are required? (Choose two.)

When wired 802.1X authentication is implemented, which two components are required? (Choose two.)A . authentication server: Cisco Identity Service EngineB . supplicant: Cisco AnyConnect ISE Posture moduleC . authenticator: Cisco Catalyst switchD . authenticator: Cisco Identity Services EngineE . authentication server: Cisco Prime InfrastructureView AnswerAnswer: AC Explanation: https://www.lookingpoint.com/blog/ise-series-802.1x

January 30, 2021 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

January 30, 2021 No Comments READ MORE +

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D Explanation: https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/

January 29, 2021 No Comments READ MORE +

How does Cisco Stealthwatch Cloud provide security for cloud environments?

How does Cisco Stealthwatch Cloud provide security for cloud environments? A. It delivers visibility and threat detection. B. It prevents exfiltration of sensitive datA. C. It assigns Internet-based DNS protection for clients and servers. D. It facilitates secure connectivity between public and private networks.View AnswerAnswer: A Explanation: https://www.content.shi.com/SHIcom/ContentAttachmentImages/SharedResources/FBLP/Cis co/Cisco-091919-Simple-IT-Whitepaper.pdf

January 29, 2021 No Comments READ MORE +

What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...

January 29, 2021 No Comments READ MORE +

Which two solutions mitigate the risk of this ransomware infection?

An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)A . Configure a posture policy in Cisco Identity Services Engine...

January 29, 2021 No Comments READ MORE +