What is the primary role of the Cisco Email Security Appliance?

What is the primary role of the Cisco Email Security Appliance?A . Mail Submission AgentB . Mail Transfer AgentC . Mail Delivery AgentD . Mail User AgentView AnswerAnswer: B

January 18, 2021 No Comments READ MORE +

Which SNMPv3 configuration must be used to support the strongest security possible?

Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andyB . asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...

January 18, 2021 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C

January 17, 2021 No Comments READ MORE +

What are two DDoS attack categories? (Choose two.)

What are two DDoS attack categories? (Choose two.)A . sequentialB . protocolC . databaseD . volume-basedE . scree-basedView AnswerAnswer: B,D Explanation: https://www.cisco.com/c/en/us/products/security/what-is-a-ddos-attack.html

January 17, 2021 No Comments READ MORE +

Which attack is commonly associated with C and C++ programming languages?

Which attack is commonly associated with C and C++ programming languages?A . cross-site scriptingB . water holingC . DDoSD . buffer overflowView AnswerAnswer: D

January 16, 2021 No Comments READ MORE +

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File AnalysisB . SafeSearchC . SSL DecryptionD . Destination ListsView AnswerAnswer: C

January 16, 2021 No Comments READ MORE +

How is ICMP used an exfiltration technique?

How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...

January 16, 2021 No Comments READ MORE +

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A

January 16, 2021 No Comments READ MORE +

What is causing this problem?

Refer to the exhibit. A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is...

January 16, 2021 1 Comment READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D

January 15, 2021 No Comments READ MORE +