Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . transparent mode B. routed mode C. inline mode D. active mode E. passive monitor-only modeView AnswerAnswer: C,D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/asdm72/firewall/asa-firewall-asdm/modules-sfr.html

August 25, 2023 No Comments READ MORE +

command must be used?

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used? A. flow-export destination inside 1.1.1.1 2055 B. ip flow monitor input C. ip flow-export destination 1.1.1.1 2055 D. flow exporterView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/monitor_nsel.html

August 25, 2023 No Comments READ MORE +

What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes B. FlexVPN and DMVPN use the new key management protocol C. FlexVPN and DMVPN use the same hashing algorithms D. IOS routers run the same NHRP code for DMVPN...

August 25, 2023 No Comments READ MORE +

How does Cisco Stealthwatch Cloud provide security for cloud environments?

How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection. B. It prevents exfiltration of sensitive data. C. It assigns Internet-based DNS protection for clients and servers. D. It facilitates secure connectivity between public and private networks.View AnswerAnswer: A Explanation: Cisco Stealthwatch Cloud:...

August 25, 2023 No Comments READ MORE +

Which type of attack is social engineering?

Which type of attack is social engineering?A . trojan B. phishing C. malware D. MITMView AnswerAnswer: B Explanation: Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company...

August 25, 2023 No Comments READ MORE +

How is ICMP used an exfiltration technique?

How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packets B. by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address C. by encrypting the payload in an ICMP packet to carry out command and...

August 25, 2023 No Comments READ MORE +

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . aaa server radius dynamic-author B. aaa new-model C. auth-type all D. ip device-trackingView AnswerAnswer: D

August 24, 2023 No Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor auth B. local web auth C. single sign-on D. central web auth E. TACACS+View AnswerAnswer: B,D

August 24, 2023 No Comments READ MORE +

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?A . health policy B. system policy C. correlation policy D. access control policy E. health awareness policyView AnswerAnswer: A

August 24, 2023 No Comments READ MORE +

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS B. Cisco FTDv with one management interface and two traffic interfaces configured C. Cisco FTDv configured in routed mode and managed...

August 24, 2023 No Comments READ MORE +