devices?

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?A . health policy B. system policy C. correlation policy D. access control policy E. health awareness policyView AnswerAnswer: A

January 18, 2023 No Comments READ MORE +

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)A . transparent mode B. routed mode C. inline mode D. active mode E. passive monitor-only modeView AnswerAnswer: C, D Explanation: You can configure your ASA FirePOWER module using one of the following deployment models: You can configure...

January 18, 2023 No Comments READ MORE +

What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role. B. A spear phishing campaign is aimed at a specific person versus a group of people. C. Spear phishing is when...

January 17, 2023 No Comments READ MORE +

On which part of the IT environment does DevSecOps focus?

On which part of the IT environment does DevSecOps focus?A . application development B. wireless network C. data center D. perimeter networkView AnswerAnswer: A

January 17, 2023 No Comments READ MORE +

What is the problem according to this command output?

Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command...

January 17, 2023 No Comments READ MORE +

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled. B. A sysopt command can be used to enable NSEL on a specific interface. C. NSEL can be used without a...

January 17, 2023 No Comments READ MORE +

Which IPS engine detects ARP spoofing?

Which IPS engine detects ARP spoofing?A . Atomic ARP Engine B. Service Generic Engine C. ARP Inspection Engine D. AIC EngineView AnswerAnswer: A

January 17, 2023 No Comments READ MORE +

Which type of attack is social engineering?

Which type of attack is social engineering?A . trojan B. phishing C. malware D. MITMView AnswerAnswer: B Explanation: Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal,often financial, information. Attackers may send email seemingly from a reputable credit card company orfinancial...

January 17, 2023 No Comments READ MORE +

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwords B. Data loss prevention C. Heuristic-based filtering D. Geolocation-based filtering E. NetFlowView AnswerAnswer: B, D Explanation: Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email...

January 17, 2023 No Comments READ MORE +

Which task can you perform to determine where each message was lost?

After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking. B. Generate a system report. C. Review the log files. D....

January 16, 2023 No Comments READ MORE +