Which function is the primary function of Cisco AMP threat Grid?
Which function is the primary function of Cisco AMP threat Grid?A . automated email encryption B. applying a real-time URI blacklist C. automated malware analysis D. monitoring network trafficView AnswerAnswer: C
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)A . Outgoing traffic is allowed so users can communicate with outside organizations. B. Malware infects the messenger application on the user endpoint to send company data. C. Traffic is encrypted, which prevents visibility on...
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?A . AMP B. AnyConnect C. DynDNS D. TalosView AnswerAnswer: D Explanation: When Umbrella receives a DNS request, it uses intelligence to determine if the request is safe, malicious or risky ― meaning the domain contains...
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)A . DDoS B. antispam C. antivirus D. encryption E. DLPView AnswerAnswer: D,E Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically B. The active and standby devices can run different versions of the...
How is DNS tunneling used to exfiltrate data out of a corporate network?
How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...
What is the primary benefit of deploying an ESA in hybrid mode?
What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environment B. It provides the lowest total cost of ownership by reducing the need for physical appliances C. It provides maximum...
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . NetFlow B. desktop client C. ASDM D. APIView AnswerAnswer: D
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . Correlation B. Intrusion C. Access Control D. Network DiscoveryView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/introduction_to_network_discovery_and_identity.html
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting. B. Perform backups to the private cloud. C. Protect against input validation and character escapes in the endpoint. D. Install a spam and virus...