What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?A . It decrypts HTTPS application traffic for unauthenticated usersB . It alerts users when the WSA decrypts their traffic.C . It decrypts HTTPS application traffic for authenticated users.D . It provides enhanced HTTPS application...
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?A . Encrypted Traffic AnalyticsB . Threat Intelligence DirectorC . Cognitive Threat AnalyticsD . Cisco Talos IntelligenceView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-troubleshoot-cisco-threat.html
Which two solutions mitigate the risk of this ransomware infection?
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)A . Configure a posture policy in Cisco Identity Services Engine...
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . BJTLSvlC . TLSv1.1D . DTLSv1View AnswerAnswer: D
What action would allow the attacker to gain access to machine 1 but not machine 2?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending continuous...
Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two.)
Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two.)A . protocol IDsB . URLsC . IP addressesD . port numbersE . MAC addressesView AnswerAnswer: B,C
Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?A . when there is a need for traditional anti-malware detectionB . when there is no need to have the solution centrally managedC . when there te no firewall on the networkD . when...
Which VPN technology can support a multivendor environment and secure traffic between sites?
Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . security intelligenceB . impact flagsC . health monitoringD . URL filteringView AnswerAnswer: A