Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)A . It can handle explicit HTTP requests. B. It requires a PAC file for the client web browser. C. It requires a proxy for the client web browser. D. WCCP v2-enabled devices can automatically redirect...
What is the primary role of the Cisco Email Security Appliance?
What is the primary role of the Cisco Email Security Appliance?A . Mail Submission Agent B. Mail Transfer Agent C. Mail Delivery Agent D. Mail User AgentView AnswerAnswer: B Explanation: Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at workby filtering unsolicited and malicious...
Which two mechanisms are used to control phishing attacks? (Choose two)
Which two mechanisms are used to control phishing attacks? (Choose two)A . Enable browser alerts for fraudulent websites. B. Define security group memberships. C. Revoke expired CRL of the websites. D. Use antispyware software. E. Implement email filtering techniques.View AnswerAnswer: A, E
How many interfaces per bridge group does an ASA bridge group deployment support?
How many interfaces per bridge group does an ASA bridge group deployment support?A . up to 2 B. up to 4 C. up to 8 D. up to 16View AnswerAnswer: B Explanation: Each of the ASAs interfaces need to be grouped into one or more bridge groups. Each of these...
Which ASA deployment mode meets these needs?
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . routed mode B. transparent mode C. multiple context mode D. multiple zone modeView AnswerAnswer: C
Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . url B. terminal C. profile D. selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication mode,...
endpoints?
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . exploits B. ARP spoofing C. denial-of-service attacks D. malware E. eavesdroppingView AnswerAnswer: A, D Explanation: Malware means “malicious software”, is any software intentionally designed to cause damage to...
ASA be added on the Cisco UC Manager platform?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust List B. Endpoint Trust List C. Enterprise Proxy Service D. Secured Collaboration ProxyView AnswerAnswer: A
System?
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security Intelligence B. Impact Flags C. Health Monitoring D. URL FilteringView AnswerAnswer: B
What is a difference between FlexVPN and DMVPN?
What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1 B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2 C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2 D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C