What is a key difference between Cisco Firepower and Cisco ASA?
What is a key difference between Cisco Firepower and Cisco ASA?A . Cisco ASA provides access control while Cisco Firepower does not.B . Cisco Firepower provides identity-based access control while Cisco ASA does not.C . Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does not.D . Cisco ASA...
Which list contains the allowed recipient addresses?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?A . SATB . BATC . HATD . RATView AnswerAnswer: D
Under which two circumstances is a CoA issued? (Choose two.)
Under which two circumstances is a CoA issued? (Choose two.)A . A new authentication rule was added to the policy on the Policy Service nodeB . An endpoint is deleted on the Identity Service Engine serverC . A new Identity Source Sequence is created and referenced in the authentication policyD...
Which functions of an SDN architecture require southbound APIs to enable communication?
Which functions of an SDN architecture require southbound APIs to enable communication?A . SDN controller and the network elementsB . management console and the SDN controllerC . management console and the cloudD . SDN controller and the cloudView AnswerAnswer: A
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . group policyB . access control policyC . device management policyD . platform service policyView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-configguide-v622/platform_settings_policies_for_managed_devices.pdf
Which two activities can be done using Cisco DNA Center? (Choose two.)
Which two activities can be done using Cisco DNA Center? (Choose two.)A . DHCPB . designC . accountingD . DNSE . provisionView AnswerAnswer: B,E
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)A . phishingB . brute forceC . man-in-the-middleD . DDOSE . tear dropView AnswerAnswer: B,C
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust ListB . Endpoint Trust ListC . Enterprise Proxy ServiceD . Secured Collaboration ProxyView AnswerAnswer: A
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabledB . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...
What is causing this issue?
Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?A . Site-to-site VPN peers are using different encryption algorithms.B . Site-to-site VPN preshared keys are mismatched.C . No split-tunnel policy is defined on the Firepower Threat Defense...