Which two capabilities does TAXII support? (Choose two.)
Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: A,B
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)A . authentication server: Cisco Identity Service EngineB . supplicant: Cisco AnyConnect ISE Posture moduleC . authenticator: Cisco Catalyst switchD . authenticator: Cisco Identity Services EngineE . authentication server: Cisco Prime InfrastructureView AnswerAnswer: A,C
Which two mechanisms are used to control phishing attacks? (Choose two.)
Which two mechanisms are used to control phishing attacks? (Choose two.)A . Enable browser alerts for fraudulent websitesB . Define security group membershipsC . Revoke expired CRL of the websitesD . Use antispyware softwareE . Implement email filtering techniquesView AnswerAnswer: A,E
What must be configured in order to prevent the session during the initial TCP communication?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?A . Configure the Cisco ESA to drop the malicious emails.B . Configure policies to quarantine malicious emails.C . Configure policies to stop and reject...
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)A . RADIUSB . TACACS+C . DHCPD . sFlowE . SMTPView AnswerAnswer: A,C
Which command enables 802.1X globally on a Cisco switch?
Which command enables 802.1X globally on a Cisco switch?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . aaa new-modelView AnswerAnswer: A
Which command achieves this goal?
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?A . snmp-server host inside 10.255.254.1 snmpv3 myv3B . snmp-server host inside 10.255.254.1 snmpv3 andyC . snmp-server...
Which ASA deployment mode meets these needs?
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . multiple context modeB . transparent modeC . routed modeD . multiple zone modeView AnswerAnswer: A
How will the Cisco ESA handle any files which need analysis?
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?A . AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.B...
Which product should be used to accomplish this goal?
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?A . Cisco FirepowerB . Cisco UmbrellaC...