What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...
What is provided by the Secure Hash Algorithm in a VPN?
What is provided by the Secure Hash Algorithm in a VPN?A . integrityB . key exchangeC . encryptionD . authenticationView AnswerAnswer: B
Which two preventive measures are used to control cross-site scripting? (Choose two.)
Which two preventive measures are used to control cross-site scripting? (Choose two.)A . Enable client-side scripts on a per-domain basisB . Incorporate contextual output encoding/escapingC . Disable cookie inspection in the HTML inspection engineD . Run untrusted HTML input through an HTML sanitization engineE . SameSite cookie attribute should not...
Refer to the exhibit.
Refer to the exhibit. Which statement about the authentication protocol used in the configuration is trueA . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packetD . There are separate authentication and...
What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is...
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . BindingB . ExchangeC . MitigatingD . Pull messagingE . CorrelationView AnswerAnswer: AD
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D
What is a commonality between DMVPN and FlexVPN technologies?
What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect systems with an up-to-date antimalware program.D . Protect against input validation and character escapes in...
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)A . SSLB . packet decoderC . SIPD . modbusE . inline normalizationView AnswerAnswer: AC