Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?A . DNS tunnelingB . DNSCryptC . DNS securityD . DNSSECView AnswerAnswer: A Explanation: Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling
Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0100011.pdf
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . correlationB . intrusionC . access controlD . network discoveryView AnswerAnswer: D
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . public cloudB . hybrid cloudC . community cloudD . private cloudView AnswerAnswer: D
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
Which two capabilities does TAXII support? (Choose two.)
Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: BC
What is the function of Cisco Cloudlock for data security?
What is the function of Cisco Cloudlock for data security?A . data loss preventionB . controls malicious cloud appsC . detects anomaliesD . user and entity behavior analyticsView AnswerAnswer: A Explanation: Reference: https://umbrella.cisco.com/products/casb