What is the difference between deceptive phishing and spear phishing?
What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: D, E Explanation: Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based...
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . transparent modeB . routed modeC . inline modeD . active modeE . passive monitor-only modeView AnswerAnswer: C, D Explanation: You can configure your ASA FirePOWER module using one of the following deployment models: You can configure...
Which option is the main function of Cisco Firepower impact flags?
Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They highlight known and suspected malicious IP addresses in reports.C . They correlate data about intrusions and vulnerability.D . They identify data that the ASA sends to the Firepower module.View...
Which ASA deployment mode meets these needs?
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C
Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...
Which IPS engine detects ARP spoofing?
Which IPS engine detects ARP spoofing?A . Atomic ARP EngineB . Service Generic EngineC . ARP Inspection EngineD . AIC EngineView AnswerAnswer: A
Which task can you perform to determine where each message was lost?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking.B . Generate a system report.C . Review the log files.D ....
Which deployment model is the most secure when considering risks to cloud adoption?
Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D