Which benefit does endpoint security provide the overall security posture of an organization?

Which benefit does endpoint security provide the overall security posture of an organization?A . It streamlines the incident response process to automatically perform digital forensics on the endpoint. B. It allows the organization to mitigate web-based attacks as long as the user is active in the domain. C. It allows...

September 1, 2023 No Comments READ MORE +

Which API is used for Content Security?

Which API is used for Content Security?A . NX-OS API B. IOS XR API C. OpenVuln API D. AsyncOS APIView AnswerAnswer: D

August 31, 2023 No Comments READ MORE +

An MDM provides which two advantages to an organization with regards to device management? (Choose two)

An MDM provides which two advantages to an organization with regards to device management? (Choose two)A . asset inventory management B. allowed application management C. Active Directory group policy management D. network device management E. critical device managementView AnswerAnswer: A,B

August 31, 2023 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . registry B. virtual C. bootloader D. user mode E. buffer modeView AnswerAnswer: C,D Explanation: The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with the highest possible level of access privileges, similar...

August 31, 2023 No Comments READ MORE +

When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?

When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?A . Spero analysis B. dynamic analysis C. sandbox analysis D. malware analysisView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Reference_a_wrapper_Chapter_topic_here.html-> Spero analysis only uploads the signature of the (executable) files to the AMP cloud. It...

August 31, 2023 No Comments READ MORE +

What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

August 31, 2023 No Comments READ MORE +

What is a feature of the open platform capabilities of Cisco DNA Center?

What is a feature of the open platform capabilities of Cisco DNA Center?A . intent-based APIs B. automation adapters C. domain integration D. application adaptersView AnswerAnswer: A

August 31, 2023 No Comments READ MORE +

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accounting B. assurance C. automation D. authentication E. encryptionView AnswerAnswer: B,C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-center/nb-06-cisco-dna-center-aag-cte-en.html

August 31, 2023 No Comments READ MORE +

Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?

Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile. B. It defines a traffic baseline for traffic anomaly deduction. C. It inspects hosts that meet the profile with more intrusion rules. D. It blocks...

August 30, 2023 No Comments READ MORE +

How is DNS tunneling used to exfiltrate data out of a corporate network?

How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...

August 30, 2023 No Comments READ MORE +