Which compliance status is shown when a configured posture policy requirement is not met?

Which compliance status is shown when a configured posture policy requirement is not met?A . compliant B. unknown C. authorized D. noncompliantView AnswerAnswer: D Explanation: Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known as posture, of all the...

January 7, 2023 No Comments READ MORE +

Which statement about IOS zone-based firewalls is true?

Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfaces B. Only one interface can be assigned to a zone. C. An interface can be assigned to multiple zones. D. An interface can be assigned only to one zone.View AnswerAnswer: D

January 7, 2023 No Comments READ MORE +

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)A . DDoS B. antispam C. antivirus D. encryption E. DLPView AnswerAnswer: D, E Explanation Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deploymentwith an appliance-based email...

January 7, 2023 No Comments READ MORE +

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?A . It decrypts HTTPS application traffic for unauthenticated users. B. It alerts users when the WSA decrypts their traffic. C. It decrypts HTTPS application traffic for authenticated users. D. It provides enhanced HTTPS application...

January 7, 2023 No Comments READ MORE +

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?A . RSA SecureID B. Internal Database C. Active Directory D. LDAPView AnswerAnswer: C

January 7, 2023 No Comments READ MORE +

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)A . configure Active Directory Group Policies to push proxy settings B. configure policy-based routing on the network infrastructure C. reference a Proxy Auto Config file D. configure the proxy IP address...

January 7, 2023 No Comments READ MORE +

engineering attacks?

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting. B. Perform backups to the private cloud. C. Protect against input validation and character escapes in the endpoint. D. Install a spam and virus...

January 6, 2023 No Comments READ MORE +

Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of service B. time synchronization C. network address translations D. intrusion policyView AnswerAnswer: B

January 6, 2023 No Comments READ MORE +

What must the administrator implement to ensure that all devices are compliant before they are allowed on thenetwork?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on thecorporate network. The endpoints must have the corporate antivirus application installed and be running thelatest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before they are...

January 6, 2023 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2 B. TLSv1.1 C. BJTLSv1 D. DTLSv1View AnswerAnswer: D Explanation: DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based.Therefore DTLS offers strongest throughput performance. The throughput of...

January 6, 2023 No Comments READ MORE +