In a PaaS model, which layer is the tenant responsible for maintaining and patching?
In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisor B. virtual machine C. network D. applicationView AnswerAnswer: D
Which list contains the allowed recipient addresses?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?A . SAT B. BAT C. HAT D. RATView AnswerAnswer: D
Which statement about IOS zone-based firewalls is true?
Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfaces B. Only one interface can be assigned to a zone. C. An interface can be assigned to multiple zones. D. An interface can be assigned only to one zone.View AnswerAnswer: D
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . Smurf B. distributed denial of service C. cross-site scripting D. rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...
Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port Bounce B. CoA Terminate C. CoA Reauth D. CoA Session QueryView AnswerAnswer: C
What is the function of the Context Directory Agent?
What is the function of the Context Directory Agent?A . maintains users’ group memberships B. relays user authentication requests from Web Security Appliance to Active Directory C. reads the Active Directory logs to map IP addresses to usernames D. accepts user authentication requests on behalf of Web Security Appliance for...
What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirected B. Traffic from the inside network is redirected C. All TCP traffic is redirected D. Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configurefirepower-00.html
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?A . 1 B. 2 C. 6 D. 31View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networkingservices/config_guide_c17-663759.html
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparent B. redirection C. forward D. proxy gatewayView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf
How is DNS tunneling used to exfiltrate data out of a corporate network?
How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...