Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwords B. Data loss prevention C. Heuristic-based filtering D. Geolocation-based filtering E. NetFlowView AnswerAnswer: B,D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events. B. It provides stateless IP flow tracking that exports all records of a specific flow. C. It tracks the flow continuously and provides updates every 10 seconds. D. Its events...
What action is needed to authenticate the VPN?
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Change isakmp to ikev2 in the command on host A. B. Enter the...
Which VPN technology can support a multivendor environment and secure traffic between sites?
Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPN B. GET VPN C. FlexVPN D. DMVPNView AnswerAnswer: C Explanation: FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with...
What is a difference between FlexVPN and DMVPN?
What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1 B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2 C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2 D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C
How is DNS tunneling used to exfiltrate data out of a corporate network?
How is DNS tunneling used to exfiltrate data out of a corporate network?A . It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks. B. It encodes the payload with random characters that are broken into short strings and...
Which SNMPv3 configuration must be used to support the strongest security possible?
Which SNMPv3 configuration must be used to support the strongest security possible?A . asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy B. asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes...
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled. B. A sysopt command can be used to enable NSEL on a specific interface. C. NSEL can be used without a...
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission. B. The attack is fragmented into groups of 8 octets before transmission. C. Short synchronized bursts of traffic are used to disrupt TCP connections. D. Malformed...
Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting theendpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port Bounce B. CoA Terminate C. CoA Reauth D. CoA Session QueryView AnswerAnswer: C