What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?A . Enable IP Layer enforcement.B . Activate the Advanced Malware Protection licenseC . Activate SSL decryption.D . Enable Intelligent Proxy.View AnswerAnswer: D
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?A . EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.B . EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.C . EPP focuses on...
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events.B . It provides stateless IP flow tracking that exports all records of a specific flow.C . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...
Which outbreak control method is used to accomplish this task?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?A . device flow correlationB . simple detectionsC . application blocking listD . advanced custom detectionsView AnswerAnswer: C
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the management solutionView AnswerAnswer: D
Which statement about the authentication protocol used in the configuration is true?
Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packet.D . There are separate authentication and...
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B
Which two key and block sizes are valid for AES? (Choose two.)
Which two key and block sizes are valid for AES? (Choose two.) A. 64-bit block size, 112-bit key length B. 64-bit block size, 168-bit key length C. 128-bit block size, 192-bit key length D. 128-bit block size, 256-bit key length E. 192-bit block size, 256-bit key lengthView AnswerAnswer: CD Explanation:...
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect against input validation and character escapes in the endpoint.D . Install a spam and virus...