What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)A . blocked portsB . simple custom detectionsC . command and controlD . allowed applicationsE . URLView AnswerAnswer: BD Explanation: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter 2
inline posture node?
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?A . RADIUS Change of AuthorizationB . device trackingC . DHCP snoopingD . VLAN hoppingView AnswerAnswer: A
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf
Where are individual sites specified to be blacklisted in Cisco Umbrella?
Where are individual sites specified to be blacklisted in Cisco Umbrella?A . application settingsB . content categoriesC . security settingsD . destination listsView AnswerAnswer: D
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D
Which statement about IOS zone-based firewalls is true?
Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zoneC . An interface can be assigned to multiple zonesD . An interface can be assigned only to one zoneView AnswerAnswer: D
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?A . SNMPB . SMTPC . syslogD . model-driven telemetryView AnswerAnswer: D
Which list contains the allowed recipient addresses?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?A . SATB . BATC . HATD . RATView AnswerAnswer: D
Which two key and block sizes are valid for AES? (Choose two.)
Which two key and block sizes are valid for AES? (Choose two.)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C,D
Which command enables 802.1X globally on a Cisco switch?
Which command enables 802.1X globally on a Cisco switch?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . aaa new-modelView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/routers/nfvis/switch_command/b-nfvis-switch-commandreference/802_1x_commands.html