For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)A . computer identityB . Windows serviceC . user identityD . Windows firewallE . default browserView AnswerAnswer: B,D
What two catalyst switch security features will prevent further violations?
A malicious user gained network access by spoofing printer connections that were authorized using MAB on four different switch ports at the same time. What two catalyst switch security features will prevent further violations? (Choose two)A . DHCP SnoopingB . 802.1AE MacSecC . Port securityD . IP Device trackingE ....
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?A . weak...
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . RSAC . DESD . AESView AnswerAnswer: B
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?A . show authentication registrationsB . show authentication methodC . show dot1x allD . show authentication sessionsView AnswerAnswer: D Explanation: Use the show authentication sessions command to display...
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two.)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two.)A . Sophos engineB . white listC . RATD . outbreak filtersE . DLPView AnswerAnswer: AD
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist CenterB . File Reputation CenterC . AMP Reputation CenterD . IP and Domain Reputation CenterView AnswerAnswer: D
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application ControlB . Security Category BlockingC . Content Category BlockingD . File AnalysisView AnswerAnswer: B