In which cloud services model is the tenant responsible for virtual machine OS patching?

In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A Explanation: Reference: https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paas­how-microsoft-office-365-azure-fit-in-021672.php

March 24, 2020 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0100011.pdf

March 23, 2020 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: C Explanation: Reference: https://tools.cisco.com/security/center/resources/sql_injection

March 22, 2020 2 Comments READ MORE +

Which two preventive measures are used to control cross-site scripting? (Choose two.)

Which two preventive measures are used to control cross-site scripting? (Choose two.)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . SameSite cookie attribute should not...

March 22, 2020 1 Comment READ MORE +

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?A . It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.B . It discovers and controls cloud apps that are connected to a company’s corporate environment.C . It...

March 22, 2020 No Comments READ MORE +

What is the function of Cisco Cloudlock for data security?

What is the function of Cisco Cloudlock for data security?A . data loss preventionB . controls malicious cloud appsC . detects anomaliesD . user and entity behavior analyticsView AnswerAnswer: A Explanation: Reference: https://umbrella.cisco.com/products/casb

March 22, 2020 No Comments READ MORE +

Which two capabilities does TAXII support? (Choose two.)

Which two capabilities does TAXII support? (Choose two.)A . exchangeB . pull messagingC . bindingD . correlationE . mitigatingView AnswerAnswer: BC

March 22, 2020 1 Comment READ MORE +

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?A . NexusB . StealthwatchC . FirepowerD . TetrationView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products

March 22, 2020 No Comments READ MORE +

Which action tests the routing?

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?A . Ensure that the client computers are pointing to the on-premises DNS servers.B . Enable the Intelligent Proxy to validate that traffic...

March 20, 2020 1 Comment READ MORE +

Which benefit does endpoint security provide the overall security posture of an organization?

Which benefit does endpoint security provide the overall security posture of an organization?A . It streamlines the incident response process to automatically perform digital forensics on the endpoint.B . It allows the organization to mitigate web-based attacks as long as the user is active in the domain.C . It allows...

March 20, 2020 No Comments READ MORE +