Which two capabilities does TAXII support? (Choose two)

Which two capabilities does TAXII support? (Choose two)A . Exchange B. Pull messaging C. Binding D. Correlation E. MitigatingView AnswerAnswer: A,B Explanation: The Trusted Automated exchange of Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to...

August 30, 2023 No Comments READ MORE +

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?A . interpacket variation B. software package variation C. flow insight variation D. process details variationView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/global/en_uk/products/switches/cisco_nexus_9300_ex_platform_switches_white_paper_uki.pdf

August 30, 2023 No Comments READ MORE +

Which action should be taken to accomplish this goal?

An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing. Which action should be taken to accomplish this goal?A . Disable telnet using the no ip telnet command. B. Enable the SSH server using the ip...

August 30, 2023 No Comments READ MORE +

How is DNS tunneling used to exfiltrate data out of a corporate network?

How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...

August 30, 2023 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and password B. encryption method C. device serial number D. registration keyView AnswerAnswer: D

August 30, 2023 No Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . Public Cloud B. Hybrid Cloud C. Community Cloud D. Private CloudView AnswerAnswer: D

August 29, 2023 No Comments READ MORE +

Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?

Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?A . configure system add <host><key> B. configure manager <key> add host C. configure manager delete D. configure manager add <host><keyView AnswerAnswer: D

August 29, 2023 No Comments READ MORE +

Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?

Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?A . RADIUS Change of Authorization B. device tracking C. DHCP snooping D. VLAN hoppingView AnswerAnswer: A

August 29, 2023 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

August 29, 2023 No Comments READ MORE +

Which statement about the authentication protocol used in the configuration is true?

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a password B. The authentication request contains only a username C. The authentication and authorization requests are grouped in a single packet D. There are separate authentication and...

August 29, 2023 No Comments READ MORE +