Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?A . File Analysis B. SafeSearch C. SSL Decryption D. Destination ListsView AnswerAnswer: C Explanation: Reference: https://support.umbrella.com/hc/en-us/articles/115004564126-SSL-Decryption-in-the-IntelligentProxy
Which product meets all of these requirements?
An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?A . Cisco Prime Infrastructure B. Cisco Identity Services...
Which task can you perform to determine where each message was lost?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking. B. Generate a system report. C. Review the log files. D....
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web application B. Linux and Windows operating systems C. database D. web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?A . Application Control B. Security Category Blocking C. Content Category Blocking D. File AnalysisView AnswerAnswer: B
Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?A . Cisco Stealth watch B. Cisco Umbrella C. Cisco Firepower D. NGIPSView AnswerAnswer: B Explanation: Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations C before...
What is a characteristic of Firepower NGIPS inline deployment mode?
What is a characteristic of Firepower NGIPS inline deployment mode?A . ASA with Firepower module cannot be deployed. B. It cannot take actions such as blocking traffic. C. It is out-of-band from traffic. D. It must have inline interface pairs configured.View AnswerAnswer: D
Which compliance status is shown when a configured posture policy requirement is not met?
Which compliance status is shown when a configured posture policy requirement is not met?A . compliant B. unknown C. authorized D. noncompliantView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_010111.html
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?A . multiple context mode B. user deployment of Layer 3 networks C. IPv6 D. clusteringView AnswerAnswer: B Explanation: The ASAv on AWS supports the following features: + Support for Amazon EC2 C5 instances, the next generation of the...
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engine B. white list C. RAT D. outbreak filters E. DLPView AnswerAnswer: A,D