Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)A . It can handle explicit HTTP requests. B. It requires a PAC file for the client web browser. C. It requires a proxy for the client web browser. D. WCCP v2-enabled devices can automatically redirect...

January 13, 2023 No Comments READ MORE +

What is the primary role of the Cisco Email Security Appliance?

What is the primary role of the Cisco Email Security Appliance?A . Mail Submission Agent B. Mail Transfer Agent C. Mail Delivery Agent D. Mail User AgentView AnswerAnswer: B Explanation: Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at workby filtering unsolicited and malicious...

January 13, 2023 No Comments READ MORE +

Which two mechanisms are used to control phishing attacks? (Choose two)

Which two mechanisms are used to control phishing attacks? (Choose two)A . Enable browser alerts for fraudulent websites. B. Define security group memberships. C. Revoke expired CRL of the websites. D. Use antispyware software. E. Implement email filtering techniques.View AnswerAnswer: A, E

January 13, 2023 No Comments READ MORE +

How many interfaces per bridge group does an ASA bridge group deployment support?

How many interfaces per bridge group does an ASA bridge group deployment support?A . up to 2 B. up to 4 C. up to 8 D. up to 16View AnswerAnswer: B Explanation: Each of the ASAs interfaces need to be grouped into one or more bridge groups. Each of these...

January 13, 2023 No Comments READ MORE +

Which ASA deployment mode meets these needs?

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?A . routed mode B. transparent mode C. multiple context mode D. multiple zone modeView AnswerAnswer: C

January 13, 2023 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . url B. terminal C. profile D. selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication mode,...

January 12, 2023 No Comments READ MORE +

endpoints?

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)A . exploits B. ARP spoofing C. denial-of-service attacks D. malware E. eavesdroppingView AnswerAnswer: A, D Explanation: Malware means “malicious software”, is any software intentionally designed to cause damage to...

January 12, 2023 No Comments READ MORE +

ASA be added on the Cisco UC Manager platform?

The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?A . Certificate Trust List B. Endpoint Trust List C. Enterprise Proxy Service D. Secured Collaboration ProxyView AnswerAnswer: A

January 11, 2023 No Comments READ MORE +

System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security Intelligence B. Impact Flags C. Health Monitoring D. URL FilteringView AnswerAnswer: B

January 11, 2023 No Comments READ MORE +

What is a difference between FlexVPN and DMVPN?

What is a difference between FlexVPN and DMVPN?A . DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1 B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2 C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2 D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2View AnswerAnswer: C

January 11, 2023 No Comments READ MORE +