Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?A . Nexus B. Stealthwatch C. Firepower D. TetrationView AnswerAnswer: D
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?A . SDN controller and the cloud B. management console and the SDN controller C. management console and the cloud D. SDN controller and the management solutionView AnswerAnswer: D
command must be used?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used? A. flow-export destination inside 1.1.1.1 2055 B. ip flow monitor input C. ip flow-export destination 1.1.1.1 2055 D. flow exporterView AnswerAnswer: A Explanation: The syntax of this command is: flow-export...
Which threat involves software being used to gain unauthorized access to a computer system?
Which threat involves software being used to gain unauthorized access to a computer system?A . virus B. NTP amplification C. ping of death D. HTTP floodView AnswerAnswer: A
What is the result of this Python script of the Cisco DNA Center API?
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds authentication to a switch B. adds a switch to Cisco DNA Center C. receives information about a switchView AnswerAnswer: B
System?
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)A . packet decoder B. SIP C. modbus D. inline normalization E. SSLView AnswerAnswer: B, E Explanation: Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application...
Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and alsoprovides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . url B. terminal C. profile D. selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication mode,...
Which algorithm provides encryption and authentication for data plane communication?
Which algorithm provides encryption and authentication for data plane communication?A . AES-GCM B. SHA-96 C. AES-256 D. SHA-384View AnswerAnswer: A Explanation: The data plane of any network is responsible for handling data packets that are transported across the network. (The data plane is also sometimes called the forwarding plane.) Maybe...
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web application B. Linux and Windows operating systems C. database D. web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . Exchange B. Pull messaging C. Binding D. Correlation E. MitigatingView AnswerAnswer: B, C Explanation: The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network.TAXII exists to provide specific capabilities to those...