What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...

March 26, 2024 No Comments READ MORE +

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: D, E Explanation: Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based...

March 26, 2024 No Comments READ MORE +

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . transparent modeB . routed modeC . inline modeD . active modeE . passive monitor-only modeView AnswerAnswer: C, D Explanation: You can configure your ASA FirePOWER module using one of the following deployment models: You can configure...

March 26, 2024 No Comments READ MORE +

Which option is the main function of Cisco Firepower impact flags?

Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They highlight known and suspected malicious IP addresses in reports.C . They correlate data about intrusions and vulnerability.D . They identify data that the ASA sends to the Firepower module.View...

March 26, 2024 No Comments READ MORE +

Which ASA deployment mode meets these needs?

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C

March 26, 2024 No Comments READ MORE +

Which technology is used to improve web traffic performance by proxy caching?

Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . FireSIGHTD . ASAView AnswerAnswer: A

March 26, 2024 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

March 26, 2024 No Comments READ MORE +

Which IPS engine detects ARP spoofing?

Which IPS engine detects ARP spoofing?A . Atomic ARP EngineB . Service Generic EngineC . ARP Inspection EngineD . AIC EngineView AnswerAnswer: A

March 25, 2024 No Comments READ MORE +

Which task can you perform to determine where each message was lost?

After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking.B . Generate a system report.C . Review the log files.D ....

March 25, 2024 No Comments READ MORE +

Which deployment model is the most secure when considering risks to cloud adoption?

Which deployment model is the most secure when considering risks to cloud adoption?A . Public CloudB . Hybrid CloudC . Community CloudD . Private CloudView AnswerAnswer: D

March 25, 2024 No Comments READ MORE +