Which form of attack is launched using botnets?

Which form of attack is launched using botnets?A . DDOSB . EIDDOSC . TCP floodD . virusView AnswerAnswer: A

November 5, 2020 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Secure the connection between the web and the app tier.B . Use prepared statements and parameterized queries.C . Check integer, float, or Boolean string parameters to ensure accurate values.D . Block SQL code execution in the...

November 5, 2020 No Comments READ MORE +

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . protectB . malwareC . URL filteringD . controlView AnswerAnswer: A

November 4, 2020 No Comments READ MORE +

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloudB . management console and the cloudC . management console and the SDN controllerD . SDN controller and the management solutionView AnswerAnswer: D

November 3, 2020 No Comments READ MORE +

Which two mechanisms are used to control phishing attacks? (Choose two)

Which two mechanisms are used to control phishing attacks? (Choose two)A . Use antispyware software.wrongB . Implement email filtering techniques.C . Revoke expired CRL of the websites.D . Enable browser alerts for fraudulent websites.E . Define security group memberships.View AnswerAnswer: BD

November 3, 2020 No Comments READ MORE +

What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

November 2, 2020 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . URL FilteringC . Impact FlagsD . Health MonitoringView AnswerAnswer: C

November 2, 2020 1 Comment READ MORE +

What is a difference between FlexVPN and DMVPN?

What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1B . DMVPN uses only IKEv1 FlexVPN uses only IKEv2C . FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2D . FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C

November 1, 2020 No Comments READ MORE +

What are two rootkit types? (Choose two)

What are two rootkit types? (Choose two)A . bootloaderB . buffer modeC . registryD . virtualE . user modeView AnswerAnswer: AE

November 1, 2020 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . ping of deathB . HTTP floodC . virusD . NTP amplificationView AnswerAnswer: C

November 1, 2020 No Comments READ MORE +