Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)A . It can handle explicit HTTP requests.B . It requires a PAC file for the client web browser.C . It requires a proxy for the client web browser.D . WCCP v2-enabled devices can automatically redirect...
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)A . Enable NetFlow Version 9.B . Create an ACL to allow UDP traffic on port 9996.C . Apply NetFlow Exporter to the outside interface in the inbound direction.D . Create a class map to match interesting...
What is the function of Cisco Cloudlock for data security?
What is the function of Cisco Cloudlock for data security?A . data loss preventionB . controls malicious cloud appsC . detects anomaliesD . user and entity behavior analyticsView AnswerAnswer: A
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . ExchangeB . Pull messagingC . BindingD . CorrelationE . MitigatingView AnswerAnswer: AB Explanation: The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to those...
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwordsB . Data loss preventionC . Heuristic-based filteringD . Geolocation-based filteringE . NetFlowView AnswerAnswer: B, D Explanation: Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email...
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Check integer, float, or Boolean string parameters to ensure accurate values.B . Use prepared statements and parameterized queries.C . Secure the connection between the web and the app tier.D . Write SQL code instead of using...
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engineB . white listC . RATD . outbreak filtersE . DLPView AnswerAnswer: A, D
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...