Which type of attack is social engineering?
Which type of attack is social engineering?A . trojanB . malwareC . phishingD . MITMView AnswerAnswer: C
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . encryption methodB . username and passwordC . device serial numberD . registration keyView AnswerAnswer: D
What is the result of this Python script of the Cisco DNA Center API?
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds a switch to Cisco DNA CenterB . adds authentication to a switchC . receives information about a switchView AnswerAnswer: A
Which VPN technology can support a multivendor environment and secure traffic between sites?
Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which two preventive measures are used to control cross-site scripting? (Choose two)A . Disable cookie inspection in the HTML inspection engine.wrongB . Incorporate contextual output encoding/escapingC . Enable client-side scripts on a per-domain basisD . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...
Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . SHA-96B . SHA-384C . AES-GCMD . AES-256View AnswerAnswer: C
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . routed modeB . active modeC . transparent modeD . inline modeE . passive monitor-only modeView AnswerAnswer: DE
Which two descriptions of AES encryption are true? (Choose two)
Which two descriptions of AES encryption are true? (Choose two)A . AES is more secure than 3DEC . AES can use a 168-bit key for encryption.D . AES can use a 256-bit key for encryption.E . AES encrypts and decrypts a key three times in sequence.F . AES is less...
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . web page imagesB . databaseC . Linux and Windows operating systemsD . user input validation in a web page or web applicationView AnswerAnswer: D