Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A

September 15, 2020 No Comments READ MORE +

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling

September 15, 2020 No Comments READ MORE +

Which technology is used to improve web traffic performance by proxy caching?

Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A

September 15, 2020 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0100011.pdf

September 14, 2020 No Comments READ MORE +

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a­glance-c45-736555.pdf

September 14, 2020 No Comments READ MORE +

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D

September 14, 2020 No Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D

September 14, 2020 No Comments READ MORE +

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...

September 13, 2020 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two.)

Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: BC

September 13, 2020 1 Comment READ MORE +

What is the function of Cisco Cloudlock for data security?

What is the function of Cisco Cloudlock for data security?A . data loss preventionB . controls malicious cloud appsC . detects anomaliesD . user and entity behavior analyticsView AnswerAnswer: A Explanation: Reference: https://umbrella.cisco.com/products/casb

September 13, 2020 No Comments READ MORE +